1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-24 23:29:18 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-03-13 15:56:22 +00:00
parent 0583637903
commit f108997a37
31 changed files with 67 additions and 67 deletions

View File

@@ -6,7 +6,7 @@ description: The Domain Name System is the "phonebook of the internet," helping
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
## What is DNS?
## Vad är DNS?
When you visit a website, a numerical address is returned. For example, when you visit `privacyguides.org`, the address `192.98.54.105` is returned.
@@ -55,16 +55,16 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
If you run the Wireshark command above, the top pane shows the "[frames](https://en.wikipedia.org/wiki/Ethernet_frame)", and the bottom pane shows all the data about the selected frame. Enterprise filtering and monitoring solutions (such as those purchased by governments) can do the process automatically, without human interaction, and can aggregate those frames to produce statistical data useful to the network observer.
| No. | Time | Source | Destination | Protocol | Length | Info |
| --- | -------- | --------- | ----------- | -------- | ------ | ---------------------------------------------------------------------- |
| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT |
| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT |
| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT |
| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT |
| No. | Time | Source | Destination | Protokoll | Length | Info |
| --- | -------- | --------- | ----------- | --------- | ------ | ---------------------------------------------------------------------- |
| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT |
| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT |
| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT |
| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT |
An observer could modify any of these packets.
## What is "encrypted DNS"?
## Vad är "krypterad DNS"?
Encrypted DNS can refer to one of a number of protocols, the most common ones being:
@@ -114,7 +114,7 @@ In locations where there is internet filtering (or censorship), visiting forbidd
When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS:
### IP Address
### IP-adress
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
@@ -279,7 +279,7 @@ Encrypted DNS with a third-party should only be used to get around redirects and
[List of recommended DNS servers](../dns.md ""){.md-button}
## What is DNSSEC?
## Vad är DNSSEC?
[Domain Name System Security Extensions](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) (DNSSEC) is a feature of DNS that authenticates responses to domain name lookups. It does not provide privacy protections for those lookups, but rather prevents attackers from manipulating or poisoning the responses to DNS requests.

View File

@@ -33,7 +33,7 @@ When buying gift cards online, there is usually a slight discount. Prepaid cards
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
## Virtual Cards
## Virtuella kort
Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information.

View File

@@ -25,7 +25,7 @@ Connecting directly to Tor will make your connection stand out to any local netw
Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like:
- [x] You → VPN → Tor → Internet
- [x] Du → VPN → Tor → Internet
From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you.
@@ -35,8 +35,8 @@ This is **not** censorship circumvention advice, because if Tor is blocked entir
We **very strongly discourage** combining Tor with a VPN in any other manner. Do not configure your connection in a way which resembles any of the following:
- You → Tor → VPN → Internet
- You → VPN → Tor → VPN → Internet
- Du → Tor → VPN → Internet
- Du → VPN → Tor → VPN → Internet
- Any other configuration
Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity.
@@ -133,7 +133,7 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl
<figcaption>Tor circuit pathway with Onion Services. Nodes in the <span class="pg-blue">blue</span> fence belong to your browser, while nodes in the <span class="pg-red">red</span> fence belong to the server, so their identity is hidden from you.</figcaption>
</figure>
## Encryption
## Kryptering
Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order.

View File

@@ -32,7 +32,7 @@
<text fill="#ffffff" font-family="Helvetica" font-size="53.309px">Your</text>
</g>
<g transform="translate(88.72 616.71)">
<text fill="#ffffff" font-family="Helvetica" font-size="53.309px">Device</text>
<text fill="#ffffff" font-family="Helvetica" font-size="53.309px">Enhet</text>
</g>
</g>
<g transform="matrix(.42318 0 0 .42318 215.19 217.54)">

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 24 KiB

View File

@@ -31,7 +31,7 @@
<text font-family="Helvetica" font-size="53.309px">Your</text>
</g>
<g transform="translate(88.72,616.71)">
<text font-family="Helvetica" font-size="53.309px">Device</text>
<text font-family="Helvetica" font-size="53.309px">Enhet</text>
</g>
</g>
<g transform="matrix(.42318 0 0 .42318 215.19 217.54)">

Before

Width:  |  Height:  |  Size: 23 KiB

After

Width:  |  Height:  |  Size: 23 KiB

View File

@@ -11,7 +11,7 @@ There are risks associated with every new service that you use. Data breaches; d
It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account.
## Terms of Service & Privacy Policy
## Användarvillkor & Integritetspolicy
The ToS are the rules that you agree to follow when using the service. With larger services these rules are often enforced by automated systems. Sometimes these automated systems can make mistakes. For example, you may be banned or locked out of your account on some services for using a VPN or VOIP number. Appealing such bans is often difficult, and involves an automated process too, which isn't always successful. This would be one of the reasons why we wouldn't suggest using Gmail for email as an example. Email is crucial for access to other services you might have signed up for.
@@ -21,7 +21,7 @@ We recommend looking for particular terms such as "data collection", "data analy
Keep in mind you're also placing your trust in the company or organization and that they will comply with their own privacy policy.
## Authentication methods
## Autentiseringsmetoder
There are usually multiple ways to sign up for an account, each with their own benefits and drawbacks.
@@ -48,7 +48,7 @@ Should a service get hacked, you might start receiving phishing or spam emails t
[Recommended email aliasing services](../email.md#email-aliasing-services ""){.md-button}
### "Sign in with..." (OAuth)
### "Logga in med..." (OAuth)
OAuth is an authentication protocol that allows you to register for a service without sharing much information with the service provider, if any, by using an existing account you have with another service instead. Whenever you see something along the lines of "Sign in with *provider name*" on a registration form, it's typically using OAuth.
@@ -72,7 +72,7 @@ There is an additional danger when using *Sign in with Google*, *Facebook*, or a
Malicious applications, particularly on mobile devices where the application has access to the WebView session used for logging in to the OAuth provider, can also abuse this process by hijacking your session with the OAuth provider and gaining access to your OAuth account through those means. Using the *Sign in with* option with any provider should usually be considered a matter of convenience that you only use with services you trust to not be actively malicious.
### Phone number
### Telefonnummer
We recommend avoiding services that require a phone number for sign up. A phone number can identity you across multiple services and depending on data sharing agreements this will make your usage easier to track, particularly if one of those services is breached as the phone number is often **not** encrypted.
@@ -80,6 +80,6 @@ You should avoid giving out your real phone number if you can. Some services wil
In many cases you will need to provide a number that you can receive SMS or calls from, particularly when shopping internationally, in case there is a problem with your order at border screening. It's common for services to use your number as a verification method; don't let yourself get locked out of an important account because you wanted to be clever and give a fake number!
### Username and password
### Användarnamn och lösenord
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.

View File

@@ -108,7 +108,7 @@ Trots den ökande massövervakningen i USA har regeringen konstaterat att massö
På nätet kan du spåras på olika sätt:
- Din IP adress
- Din IP-adress
- Webbläsarcookies
- Uppgifter som du skickar till webbplatser
- Fingeravtryck från din webbläsare eller enhet

View File

@@ -106,6 +106,6 @@ For people looking to increase their privacy and security online, we've compiled
- [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md)
## Sources
## Källor
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)

View File

@@ -24,7 +24,7 @@ Security is the ability to trust the applications you use—that the parties inv
Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
**Anonymity**
**Anonymitet**
:
Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
@@ -52,7 +52,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
## Sources
## Källor
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why)

View File

@@ -13,7 +13,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [
| DNS Provider | Integritetspolicy | Protocols | Logging | ECS | Filtering |
| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- |
| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext <br> DoH/3 <br> DoT <br> DoQ <br> DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) |
| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext <br> DoH/3 <br> DoT <br> DoQ <br> DNSCrypt | Some[^1] | Ja | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) |
| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext <br> DoH/3 <br> DoT | Some[^2] | No | Based on personal configuration. |
| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext <br> DoH/3 <br> DoT <br> DoQ | Optional[^3] | No | Based on personal configuration. |
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH <br> DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) |

View File

@@ -1,5 +1,5 @@
---
title: Translations
title: Översättningar
---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@@ -4,7 +4,7 @@ title: Uploading Images
Here are a couple of general rules for contributing to Privacy Guides:
## Images
## Bilder
- We **prefer** SVG images, but if those do not exist we can use PNG images
@@ -17,7 +17,7 @@ Company logos have canvas size of:
### PNG
Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image:
Använd [OptiPNG](https://sourceforge.net/projects/optipng) för att optimera PNG-bilden:
```bash
optipng -o7 file.png

View File

@@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person
>
> When you use “you” to address users, they are more likely to understand what their responsibility is.
Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user)
Källa: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user)
### Avoid "users"

View File

@@ -254,6 +254,6 @@ When it is necessary to use one of these processors, Apple works with the vendor
Apple silicon separates each component that requires direct memory access. For example, a Thunderbolt port can't access memory designated for the kernel.
## Sources
## Källor
- [Apple Platform Security](https://support.apple.com/guide/security/welcome/web)