From eb21f7a5532c7ed5a0dcd13ce2cd394146bbdd63 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Sat, 23 Dec 2023 14:32:11 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/id/android.md | 8 ++++---- i18n/ko/tor.md | 12 ++++++------ 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/i18n/id/android.md b/i18n/id/android.md index 9f872c5f..2c71c8d6 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -138,15 +138,15 @@ Ponsel Google Pixel adalah satu-satunya perangkat yang saat ini memenuhi persyar [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Kode Sumber" } [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Kontribusi } -DivestOS memiliki mekanisme [penambalan](https://gitlab.com/divested-mobile/cve_checker) kerentanan kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) otomatis, lebih sedikit *proprietary blobs*, dan berkas [hosts](https://divested.dev/index.php?page=dnsbl) khusus. WebView-nya yang telah diperkuat, [Mulch](https://gitlab.com/divested-mobile/mulch), mengaktifkan [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) untuk semua arsitektur dan [partisi status jaringan](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), dan menerima pembaruan luar *band*. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS memiliki mekanisme [penambalan](https://gitlab.com/divested-mobile/cve_checker) kerentanan kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) otomatis, lebih sedikit *proprietary blobs*, dan berkas [hosts](https://divested.dev/index.php?page=dnsbl) khusus. WebView-nya yang telah diperkuat, [Mulch](https://gitlab.com/divested-mobile/mulch), mengaktifkan [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) untuk semua arsitektur dan [partisi status jaringan](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), dan menerima pembaruan luar *band*. DivestOS juga menyertakan tambalan kernel dari GrapheneOS dan mengaktifkan semua fitur keamanan kernel yang tersedia melalui [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Semua kernel yang lebih baru dari versi 3.4 menyertakan [sanitasi](https://lwn.net/Articles/334747/) halaman penuh dan semua kernel yang dikompilasi oleh ~22 Clang memiliki [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) yang diaktifkan. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS mengimplementasikan beberapa tambalan penguatan sistem yang awalnya dikembangkan untuk GrapheneOS. DivestOS 16.0 dan yang lebih tinggi mengimplementasikan fitur GrapheneOS izin [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) dan SENSORS, [pengalokasi memori yang diperkuat](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), dan perangkat tambahan penguatan [bionik](https://en.wikipedia.org/wiki/Bionic_(software)) parsial. Versi 17.1 dan yang lebih tinggi memiliki fitur GrapheneOS opsi [pengacakan MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) per-jaringan penuh, kontrol [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html), dan opsi mulai ulang/Wi-Fi/ Bluetooth [dalam batas waktu tertentu](https://grapheneos.org/features) secara otomatis. -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS menggunakan F-Droid sebagai toko aplikasi bawaan. Kami biasanya [menyarankan untuk menghindari F-Droid](#f-droid), tetapi melakukan hal itu di DivestOS tidak memungkinkan; para pengembang DivestOS memperbarui aplikasi mereka melalui repositori F-Droid mereka sendiri ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) dan [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). Kami menyarankan untuk menonaktifkan aplikasi resmi F-Droid dan menggunakan [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **serta mengaktifkan repositori DivestOS** agar komponen-komponen tersebut selalu diperbarui. Untuk aplikasi-aplikasi lain, kami tetap menyarankan metode yang kami rekomendasikan. !!! peringatan - DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative. + Pembaruan firmware [status] (https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) dan kontrol kualitas perangkat-perangkat yang didukung DivestOS bervariasi. Kami tetap merekomendasikan GrapheneOS tergantung kompatibilitas perangkat Anda. Untuk perangkat lain, DivestOS adalah alternatif yang bagus. Not all of the supported devices have verified boot, and some perform it better than others. diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index bc51e26d..b27e8dcb 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -27,11 +27,11 @@ schema: **Tor** 네트워크는 자원 봉사 형태로 운영되는 서버 그룹으로, 무료로 연결하여 인터넷에서 프라이버시와 보안을 향상시킬 수 있습니다. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-home-16:](https://www.torproject.org){ .card-link title=홈페이지 } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion 서비스" } +[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title="관련 문서"} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="소스 코드" } +[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=기여하기 } Tor는 방문하려는 사이트에 직접 연결하는 방식이 아닌, 자원 봉사자가 운영하는 서버를 통해 인터넷 트래픽을 전송합니다. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. @@ -77,7 +77,7 @@ If more complete anonymity is paramount to your situation, you should **only** b Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식별을 방지하도록 설계되었습니다. 따라서, 브라우저를 기본 [보안 수준](https://tb-manual.torproject.org/security-settings/)을 벗어나는 수정을 해서는 **안 됩니다**. -In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. +Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qubes OS](desktop.md#qubes-os)의 [Whonix](desktop.md#whonix)처럼 Tor 네트워크에 연결하기 위한 용도로 만들어진 운영 체제도 있습니다. 이러한 연결 방식은 Tor Browser를 사용하는 것보다 더 강력한 보안을 제공합니다. ### Orbot