diff --git a/i18n/de/android.md b/i18n/de/android.md index 2f79dd91..744cf705 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -152,7 +152,7 @@ DivestOS implements some system hardening patches originally developed for Graph DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
-

Warning

+

Warnung

DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative. @@ -225,7 +225,7 @@ Shelter supports blocking contact search cross profiles and sharing files across
-

Warning

+

Warnung

Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). diff --git a/i18n/de/basics/multi-factor-authentication.md b/i18n/de/basics/multi-factor-authentication.md index 1cf3c9b4..1844c214 100644 --- a/i18n/de/basics/multi-factor-authentication.md +++ b/i18n/de/basics/multi-factor-authentication.md @@ -141,7 +141,7 @@ The command will prevent an adversary from bypassing MFA when the computer boots ### Linux
-

Warning

+

Warnung

If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide. diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 9268e0b9..32706257 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -123,7 +123,7 @@ The app offers multiple ways to erase metadata from images. Namely:
-

Warning

+

Warnung

You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, draw a box over the text. For this, we suggest apps like [Pocket Paint](https://github.com/Catrobat/Paintroid). diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index 9696f291..aa7b3d27 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -134,7 +134,7 @@ Mullvad Browser wird mit DuckDuckGo als Standard [Suchmaschine](search-engines.m
-

Warning

+

Warnung

Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases). @@ -252,7 +252,7 @@ Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anf **macOS users:** The download for Brave Browser from their official website is a `.pkg` installer which requires admin privileges to run (and may run other unnecessary scripts on your machine). As an alternative, you can download the latest `Brave-Browser-universal.dmg` file from their [GitHub releases](https://github.com/brave/brave-browser/releases/latest) page, which provides a traditional "drag to Applications folder" install.
-

Warning

+

Warnung

Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave%E2%80%99s-Use-of-Referral-Codes)" to the file name in downloads from the Brave website, which is used to track which source the browser was downloaded from, for example `BRV002` in a download named `Brave-Browser-BRV002.pkg`. The installer will then ping Brave's server with the referral code at the end of the installation process. If you're concerned about this, you can rename the installer file before opening it. diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index 1fac706b..5dcbeee5 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -168,7 +168,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
-

Warning

+

Warnung

Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time. diff --git a/i18n/de/device-integrity.md b/i18n/de/device-integrity.md index 75b6f7ac..475aba93 100644 --- a/i18n/de/device-integrity.md +++ b/i18n/de/device-integrity.md @@ -82,7 +82,7 @@ These tools can trigger false-positives. If any of these tools finds indicators
-

Warning

+

Warnung

Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -131,7 +131,7 @@ iMazing automates and interactively guides you through the process of using [MVT These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.
-

Warning

+

Warnung

Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -184,7 +184,7 @@ If your [threat model](basics/threat-modeling.md) requires privacy, you could co These are apps you can install on your device which scan your device for signs of compromise.
-

Warning

+

Warnung

Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. diff --git a/i18n/de/email-clients.md b/i18n/de/email-clients.md index 8db5bc08..44f92bd1 100644 --- a/i18n/de/email-clients.md +++ b/i18n/de/email-clients.md @@ -108,7 +108,7 @@ Apple Mail has the ability to load remote content in the background or block it
-Warning +Warnung Canary Mail only recently released a Windows and Android client, though we don't believe they are as stable as their iOS and Mac counterparts. @@ -190,7 +190,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022
-

Warning

+

Warnung

When replying to someone on a mailing list the "reply" option may also include the mailing list. For more information see [thundernest/k-9 #3738](https://github.com/thundernest/k-9/issues/3738). diff --git a/i18n/de/email.md b/i18n/de/email.md index 3b89f3fc..c0475388 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -19,7 +19,7 @@ Für alles andere empfehlen wir eine Reihe von E-Mail-Anbietern, die auf nachhal ## OpenPGP-kompatible Dienste -These providers natively support OpenPGP encryption/decryption and the [Web Key Directory standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic E2EE emails. Zum Beispiel können Kunden von Proton Mail eine E2EE-Nachricht an Kunden von Mailbox.org senden oder sie können OpenPGP-verschlüsselte Benachrichtigungen von Internetdiensten erhalten, die dies unterstützen. +Diese Anbieter unterstützen von Haus aus die OpenPGP-Ver- und Entschlüsselung sowie den Web Key Directory Standard, so dass anbieterunabhängige E2E-verschlüsselte E-Mails möglich sind. Zum Beispiel können Kunden von Proton Mail eine E2EE-Nachricht an Kunden von Mailbox.org senden oder sie können OpenPGP-verschlüsselte Benachrichtigungen von Internetdiensten erhalten, die dies unterstützen.
@@ -29,11 +29,11 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key
-

Warning

+

Warnung

-When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview). +Wenn Sie eine E2EE-Technologie wie OpenPGP verwenden, enthält Ihre E-Mail immer noch einige unverschlüsselte Metadaten im Header (Quelltext) der E-Mail, einschließlich der Betreffzeile! Lesen Sie mehr über [E-Mail-Metadaten](basics/email-security.md#email-metadata-overview). -OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys) +OpenPGP unterstützt auch keine Forward Secrecy. Das heißt, wenn entweder Ihr privater Schlüssel oder der des Empfängers gestohlen wird, sind alle vorher damit verschlüsselten Nachrichten offen. [Wie schütze ich meine privaten Schlüssel?](basics/email-security.md#how-do-i-protect-my-private-keys)
@@ -46,9 +46,9 @@ OpenPGP also does not support Forward secrecy, which means if either your or the **Proton Mail** ist ein E-Mail-Dienst mit dem Schwerpunkt auf Datenschutz, Verschlüsselung, Sicherheit und Benutzerfreundlichkeit. Sie sind seit **2013** in Betrieb. Die Proton AG hat ihren Sitz in Genf, Schweiz. Konten im kostenlosen Tarif beginnen mit 1 GB Speicherplatz. [:octicons-home-16: Homepage](https://proton.me/mail){ .md-button .md-button--primary } -[:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/mail){ .card-link title=Documentation} +[:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion / Tor" } +[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Datenschutzerklärung" } +[:octicons-info-16:](https://proton.me/support/mail){ .card-link title=Dokumentation} [:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Source Code" }
diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 1769b24a..5d414f5a 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -70,7 +70,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op
-

Warning

+

Warnung

When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -103,7 +103,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) b
-

Warning

+

Warnung

When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -137,7 +137,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo
-

Warning

+

Warnung

When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -173,7 +173,7 @@ Your subscription list and playlists are saved locally on your Android device. 1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**
-

Warning

+

Warnung

When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -201,7 +201,7 @@ There are a number of public instances, with some instances having [Tor](tor.md)
-

Warning

+

Warnung

Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. diff --git a/i18n/de/index.md b/i18n/de/index.md index ac430a98..c4a11d7f 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -46,7 +46,7 @@ schema: Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht. -[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } +[:material-book-outline: Warum Privatsphäre wichtig ist](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Was kann ich tun? diff --git a/i18n/de/meta/admonitions.md b/i18n/de/meta/admonitions.md index d47127e0..f1ee2138 100644 --- a/i18n/de/meta/admonitions.md +++ b/i18n/de/meta/admonitions.md @@ -103,7 +103,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. #### `warning`
-

Warning

+

Warnung

Lorem ipsum dolor sit amet, consectetur adipiscing elit. diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md index ee60af63..47bf0748 100644 --- a/i18n/de/multi-factor-authentication.md +++ b/i18n/de/multi-factor-authentication.md @@ -32,7 +32,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.
-

Warning

+

Warnung

The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -61,14 +61,14 @@ Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.
-

Warning

+

Warnung

While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.
-

Warning

+

Warnung

Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). diff --git a/i18n/de/os/android-overview.md b/i18n/de/os/android-overview.md index f866b6cb..4cdab114 100644 --- a/i18n/de/os/android-overview.md +++ b/i18n/de/os/android-overview.md @@ -100,7 +100,7 @@ An app may request a permission for a specific feature it has. For example, any [Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
-

Warning

+

Warnung

If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. diff --git a/i18n/de/os/ios-overview.md b/i18n/de/os/ios-overview.md index fa3d3bcf..eab78e7a 100644 --- a/i18n/de/os/ios-overview.md +++ b/i18n/de/os/ios-overview.md @@ -147,7 +147,7 @@ After enabling stolen data protection, [certain actions](https://support.apple.c iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
-

Warning

+

Warnung

With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. diff --git a/i18n/de/os/macos-overview.md b/i18n/de/os/macos-overview.md index 822bfd40..d177ac61 100644 --- a/i18n/de/os/macos-overview.md +++ b/i18n/de/os/macos-overview.md @@ -157,7 +157,7 @@ macOS employs defense in depth by relying on multiple layers of software and har ### Software Security
-

Warning

+

Warnung

macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. @@ -182,7 +182,7 @@ System Integrity Protection makes critical file locations read-only to protect a macOS apps downloaded from the App Store are required to be sandboxed usng the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).
-

Warning

+

Warnung

Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible. diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 6a1f7de0..18dcb5e4 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -129,7 +129,7 @@ Briar supports forward secrecy[^1] by using the Bramble [Handshake](https://code ## Additional Options
-

Warning

+

Warnung

These messengers do not have forward secrecy[^1], and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications. diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index b1892ece..ea799e46 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -98,7 +98,7 @@ Wenn du eine SearXNG-Instanz verwendest, beachte unbedingt deren Datenschutzbest
-

Warning

+

Warnung

Startpage beschränkt regelmäßig den Zugang zu seinem Dienst auf bestimmten IP-Adressen, wie IPs, die für VPNs oder Tor reserviert sind. [DuckDuckGo](#duckduckgo) und [Brave Search](#brave-search) sind freundlichere Optionen, wenn dein Bedrohungsmodell das Verbergen deiner IP-Adresse vor dem Suchanbieter erfordert. diff --git a/i18n/sv/advanced/dns-overview.md b/i18n/sv/advanced/dns-overview.md index 2ffb67b2..eccd5da5 100644 --- a/i18n/sv/advanced/dns-overview.md +++ b/i18n/sv/advanced/dns-overview.md @@ -6,7 +6,7 @@ description: The Domain Name System is the "phonebook of the internet," helping The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers. -## What is DNS? +## Vad är DNS? When you visit a website, a numerical address is returned. For example, when you visit `privacyguides.org`, the address `192.98.54.105` is returned. @@ -55,16 +55,16 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s If you run the Wireshark command above, the top pane shows the "[frames](https://en.wikipedia.org/wiki/Ethernet_frame)", and the bottom pane shows all the data about the selected frame. Enterprise filtering and monitoring solutions (such as those purchased by governments) can do the process automatically, without human interaction, and can aggregate those frames to produce statistical data useful to the network observer. -| No. | Time | Source | Destination | Protocol | Length | Info | -| --- | -------- | --------- | ----------- | -------- | ------ | ---------------------------------------------------------------------- | -| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT | -| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT | -| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT | -| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT | +| No. | Time | Source | Destination | Protokoll | Length | Info | +| --- | -------- | --------- | ----------- | --------- | ------ | ---------------------------------------------------------------------- | +| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT | +| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT | +| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT | +| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT | An observer could modify any of these packets. -## What is "encrypted DNS"? +## Vad är "krypterad DNS"? Encrypted DNS can refer to one of a number of protocols, the most common ones being: @@ -114,7 +114,7 @@ In locations where there is internet filtering (or censorship), visiting forbidd When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS: -### IP Address +### IP-adress The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides. @@ -279,7 +279,7 @@ Encrypted DNS with a third-party should only be used to get around redirects and [List of recommended DNS servers](../dns.md ""){.md-button} -## What is DNSSEC? +## Vad är DNSSEC? [Domain Name System Security Extensions](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) (DNSSEC) is a feature of DNS that authenticates responses to domain name lookups. It does not provide privacy protections for those lookups, but rather prevents attackers from manipulating or poisoning the responses to DNS requests. diff --git a/i18n/sv/advanced/payments.md b/i18n/sv/advanced/payments.md index 99777425..e03fb474 100644 --- a/i18n/sv/advanced/payments.md +++ b/i18n/sv/advanced/payments.md @@ -33,7 +33,7 @@ When buying gift cards online, there is usually a slight discount. Prepaid cards - [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces) -## Virtual Cards +## Virtuella kort Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information. diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index e081a794..8c837670 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -25,7 +25,7 @@ Connecting directly to Tor will make your connection stand out to any local netw Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: -- [x] You → VPN → Tor → Internet +- [x] Du → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. @@ -35,8 +35,8 @@ This is **not** censorship circumvention advice, because if Tor is blocked entir We **very strongly discourage** combining Tor with a VPN in any other manner. Do not configure your connection in a way which resembles any of the following: -- You → Tor → VPN → Internet -- You → VPN → Tor → VPN → Internet +- Du → Tor → VPN → Internet +- Du → VPN → Tor → VPN → Internet - Any other configuration Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. @@ -133,7 +133,7 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl
Tor circuit pathway with Onion Services. Nodes in the blue fence belong to your browser, while nodes in the red fence belong to the server, so their identity is hidden from you.
-## Encryption +## Kryptering Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. diff --git a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index ce51beee..a60f1979 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -32,7 +32,7 @@ Your - Device + Enhet diff --git a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg index 8d008447..0629fb0e 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -31,7 +31,7 @@ Your - Device + Enhet diff --git a/i18n/sv/basics/account-creation.md b/i18n/sv/basics/account-creation.md index 16f79eb6..635cdbc9 100644 --- a/i18n/sv/basics/account-creation.md +++ b/i18n/sv/basics/account-creation.md @@ -11,7 +11,7 @@ There are risks associated with every new service that you use. Data breaches; d It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account. -## Terms of Service & Privacy Policy +## Användarvillkor & Integritetspolicy The ToS are the rules that you agree to follow when using the service. With larger services these rules are often enforced by automated systems. Sometimes these automated systems can make mistakes. For example, you may be banned or locked out of your account on some services for using a VPN or VOIP number. Appealing such bans is often difficult, and involves an automated process too, which isn't always successful. This would be one of the reasons why we wouldn't suggest using Gmail for email as an example. Email is crucial for access to other services you might have signed up for. @@ -21,7 +21,7 @@ We recommend looking for particular terms such as "data collection", "data analy Keep in mind you're also placing your trust in the company or organization and that they will comply with their own privacy policy. -## Authentication methods +## Autentiseringsmetoder There are usually multiple ways to sign up for an account, each with their own benefits and drawbacks. @@ -48,7 +48,7 @@ Should a service get hacked, you might start receiving phishing or spam emails t [Recommended email aliasing services](../email.md#email-aliasing-services ""){.md-button} -### "Sign in with..." (OAuth) +### "Logga in med..." (OAuth) OAuth is an authentication protocol that allows you to register for a service without sharing much information with the service provider, if any, by using an existing account you have with another service instead. Whenever you see something along the lines of "Sign in with *provider name*" on a registration form, it's typically using OAuth. @@ -72,7 +72,7 @@ There is an additional danger when using *Sign in with Google*, *Facebook*, or a Malicious applications, particularly on mobile devices where the application has access to the WebView session used for logging in to the OAuth provider, can also abuse this process by hijacking your session with the OAuth provider and gaining access to your OAuth account through those means. Using the *Sign in with* option with any provider should usually be considered a matter of convenience that you only use with services you trust to not be actively malicious. -### Phone number +### Telefonnummer We recommend avoiding services that require a phone number for sign up. A phone number can identity you across multiple services and depending on data sharing agreements this will make your usage easier to track, particularly if one of those services is breached as the phone number is often **not** encrypted. @@ -80,6 +80,6 @@ You should avoid giving out your real phone number if you can. Some services wil In many cases you will need to provide a number that you can receive SMS or calls from, particularly when shopping internationally, in case there is a problem with your order at border screening. It's common for services to use your number as a verification method; don't let yourself get locked out of an important account because you wanted to be clever and give a fake number! -### Username and password +### Användarnamn och lösenord Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password. diff --git a/i18n/sv/basics/common-threats.md b/i18n/sv/basics/common-threats.md index 7bde1416..eb65b946 100644 --- a/i18n/sv/basics/common-threats.md +++ b/i18n/sv/basics/common-threats.md @@ -108,7 +108,7 @@ Trots den ökande massövervakningen i USA har regeringen konstaterat att massö På nätet kan du spåras på olika sätt: -- Din IP adress +- Din IP-adress - Webbläsarcookies - Uppgifter som du skickar till webbplatser - Fingeravtryck från din webbläsare eller enhet diff --git a/i18n/sv/basics/threat-modeling.md b/i18n/sv/basics/threat-modeling.md index 922c7450..fb2ce610 100644 --- a/i18n/sv/basics/threat-modeling.md +++ b/i18n/sv/basics/threat-modeling.md @@ -106,6 +106,6 @@ For people looking to increase their privacy and security online, we've compiled - [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md) -## Sources +## Källor - [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan) diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md index b48c26e5..79520cd9 100644 --- a/i18n/sv/basics/why-privacy-matters.md +++ b/i18n/sv/basics/why-privacy-matters.md @@ -24,7 +24,7 @@ Security is the ability to trust the applications you use—that the parties inv Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. -**Anonymity** +**Anonymitet** : Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. @@ -52,7 +52,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -## Sources +## Källor - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards - [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index 6e1bd27f..9aba18a2 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -13,7 +13,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [ | DNS Provider | Integritetspolicy | Protocols | Logging | ECS | Filtering | | -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Ja | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | | [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | | [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | | [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | diff --git a/i18n/sv/meta/translations.md b/i18n/sv/meta/translations.md index 5fddd290..7aefce07 100644 --- a/i18n/sv/meta/translations.md +++ b/i18n/sv/meta/translations.md @@ -1,5 +1,5 @@ --- -title: Translations +title: Översättningar --- Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. diff --git a/i18n/sv/meta/uploading-images.md b/i18n/sv/meta/uploading-images.md index 44c5833d..abaf8395 100644 --- a/i18n/sv/meta/uploading-images.md +++ b/i18n/sv/meta/uploading-images.md @@ -4,7 +4,7 @@ title: Uploading Images Here are a couple of general rules for contributing to Privacy Guides: -## Images +## Bilder - We **prefer** SVG images, but if those do not exist we can use PNG images @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: +Använd [OptiPNG](https://sourceforge.net/projects/optipng) för att optimera PNG-bilden: ```bash optipng -o7 file.png diff --git a/i18n/sv/meta/writing-style.md b/i18n/sv/meta/writing-style.md index 739ca47e..132203bd 100644 --- a/i18n/sv/meta/writing-style.md +++ b/i18n/sv/meta/writing-style.md @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) +Källa: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" diff --git a/i18n/sv/os/macos-overview.md b/i18n/sv/os/macos-overview.md index eb1e133f..1174e2a8 100644 --- a/i18n/sv/os/macos-overview.md +++ b/i18n/sv/os/macos-overview.md @@ -254,6 +254,6 @@ When it is necessary to use one of these processors, Apple works with the vendor Apple silicon separates each component that requires direct memory access. For example, a Thunderbolt port can't access memory designated for the kernel. -## Sources +## Källor - [Apple Platform Security](https://support.apple.com/guide/security/welcome/web)