1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-16 07:51:13 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot 2025-04-05 17:33:08 +00:00
parent 7957ee774e
commit f7884ea2eb
8 changed files with 43 additions and 43 deletions

View File

@ -3,7 +3,7 @@ title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause.
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause.
We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below.

View File

@ -161,7 +161,7 @@ To check the authenticity and safety of the model, look for:
- Community reviews and usage statistics
- A "Safe" badge next to the model file (Hugging Face only)
- Matching checksums[^1]
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
A downloaded model is generally safe if it satisfies all the above checks.

View File

@ -38,7 +38,7 @@ There are also many private alternatives to the apps that come pre-installed on
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require more permissive SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:

View File

@ -101,7 +101,7 @@ If you use iOS and are at high-risk, we have three additional suggestions for yo
2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).

View File

@ -304,7 +304,7 @@ This prevents Siri from using content from Safari for Siri suggestions.
- [ ] Disable **Search Engine Suggestions**
This setting sends whatever you type in the address bar to the search engine set in Safari. غیرفعال کردن پیشنهادهای جستجو به شما اجازه می‌دهد که با دقت بیشتری کنترل کنید که چه داده‌هایی را به ارائه‌دهنده موتور جستجو ارسال می‌کنید.
This setting sends whatever you type in the address bar to the search engine set in Safari. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
#### Profiles

View File

@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc
**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud.
[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" }
:octicons-eye-16:{ .card-link title="Privacy Policy" }
:octicons-info-16:{ .card-link title=Documentation}
:octicons-code-16:{ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>

View File

@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th
#### Device Guard
- Turn On Virtualization Based Security: **Enabled**
- Platform Security Level: **Secure Boot and DMA Protection**
- Secure Launch Configuration: **Enabled**
- Platform Security Level: **Secure Boot and DMA Protection**
- Secure Launch Configuration: **Enabled**
#### Internet Communication Management
@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform
- Turn off AutoPlay: **Enabled**
- Disallow Autoplay for nonvolume devices: **Enabled**
- Set the default behavior for AutoRun: **Enabled**
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
#### BitLocker Drive Encryption
You may wish to re-encrypt your operating system drive after changing these settings.
- Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled**
- Select the encryption method: **AES-256**
- Select the encryption method: **AES-256**
Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows.
@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b
#### Data Collection and Preview Builds
- Allow Diagnostic Data: **Enabled**
- Options: **Send required diagnostic data** (Pro Edition); or
- Options: **Diagnostic data off** (Enterprise or Education Edition)
- Options: **Send required diagnostic data** (Pro Edition); or
- Options: **Diagnostic data off** (Enterprise or Education Edition)
- Limit Diagnostic Log Collection: **Enabled**
- Limit Dump Collection: **Enabled**
- Limit optional diagnostic data for Desktop Analytics: **Enabled**
- Options: **Disable Desktop Analytics collection**
- Options: **Disable Desktop Analytics collection**
- Do not show feedback notifications: **Enabled**
#### File Explorer
@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to **
- Allow Cortana: **Disabled**
- Don't search the web or display web results in Search: **Enabled**
- Set what information is shared in Search: **Enabled**
- Type of information: **Anonymous info**
- Type of information: **Anonymous info**
#### Sync your settings
@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to **
- Do not send additional data: **Enabled**
- Consent > Configure Default consent: **Enabled**
- Consent level: **Always ask before sending data**
- Consent level: **Always ask before sending data**

View File

@ -1,8 +1,8 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "مرورگر و شبکه Tor: گشت‌وگذار ناشناس در اینترنت - راهنمای حریم خصوصی"
title: "Tor Browser"
icon: simple/torbrowser
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
description: با استفاده از شبکه Tor، یک شبکه امن که سانسور را دور می‌زند، فعالیت‌های اینترنتی خود را از چشم‌های کنجکاو محافظت کنید.
cover: tor.webp
schema:
-
@ -23,24 +23,24 @@ schema:
url: "./"
---
<small>Protects against the following threat(s):</small>
<small>در برابر تهدیدات زیر محافظت می‌کند:</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray}
- [:material-account-cash: سرمایه‌داری نظارتی](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
- [:material-eye-outline: نظارت جمعی](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
- [:material-close-outline: سانسور](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray}
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
[مشاهده جزئیات کامل Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: ویدیو: چرا به Tor نیاز دارید](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
<div class="admonition tip" markdown>
<p class="admonition-title">Tip</p>
<p class="admonition-title">نکته</p>
Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity.
</div>
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android.
راه‌های مختلفی برای اتصال به شبکه Tor از دستگاه شما وجود دارد که رایج‌ترین آن **مرورگر Tor** است، یک انشعاب از فایرفاکس که برای [:material-incognito: گشت‌وگذار ناشناس](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} در رایانه‌های رومیزی و اندروید طراحی شده است.
Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
@ -61,20 +61,20 @@ If more complete anonymity is paramount to your situation, you should **only** b
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
<details class="downloads" markdown>
<summary>Downloads</summary>
<summary>دانلود</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser)
- [:simple-android: Android](https://torproject.org/download/#android)
- [:fontawesome-brands-windows: Windows](https://torproject.org/download)
- [:simple-apple: macOS](https://torproject.org/download)
- [:simple-linux: Linux](https://torproject.org/download)
- [:simple-googleplay: گوگل پلی](https://play.google.com/store/apps/details?id=org.torproject.torbrowser)
- [:simple-android: اندروید](https://torproject.org/download/#android)
- [:fontawesome-brands-windows: ویندوز](https://torproject.org/download)
- [:simple-apple: مک‌اواس](https://torproject.org/download)
- [:simple-linux: لینوکس](https://torproject.org/download)
</details>
</div>
<div class="admonition danger" markdown>
<p class="admonition-title">Danger</p>
<p class="admonition-title">هشدار</p>
You should **never** install any additional extensions on Tor Browser or edit `about:config` settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting).
@ -82,7 +82,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings).
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
علاوه بر نصب مستقیم مرورگر Tor روی رایانه شما، سیستم‌عامل‌هایی نیز وجود دارند که به طور خاص برای اتصال به شبکه Tor طراحی شده‌اند، مانند [Whonix](desktop.md#whonix) روی [Qubes OS](desktop.md#qubes-os)، که امنیت و محافظت‌های بیشتری نسبت به مرورگر Tor به تنهایی ارائه می‌دهند.
## Orbot
@ -99,20 +99,20 @@ In addition to installing Tor Browser on your computer directly, there are also
[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute }
<details class="downloads" markdown>
<summary>Downloads</summary>
<summary>دانلود</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599)
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
- [:simple-googleplay: گوگل پلی](https://play.google.com/store/apps/details?id=org.torproject.android)
- [:simple-appstore: اپ استور](https://apps.apple.com/app/id1609461599)
- [:simple-github: گیت‌هاب](https://github.com/guardianproject/orbot/releases)
</details>
</div>
We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]
ما قبلاً توصیه می‌کردیم که ترجیح *جدا کردن آدرس مقصد* را در تنظیمات Orbot فعال کنید. اگرچه این تنظیم از نظر تئوری می‌تواند با اجبار به استفاده از مدارهای مختلف برای هر آدرس IP که به آن متصل می‌شوید، حریم خصوصی را بهبود بخشد، اما برای اکثر برنامه‌های کاربردی (به ویژه مرورگری اینترنت) مزیت عملی محسوسی ندارد، ممکن است باعث کاهش محسوس عملکرد شود و بار اضافی بر شبکه Tor تحمیل کند. ما دیگر تغییر این تنظیم از مقدار پیش‌فرض آن را توصیه نمی‌کنیم، مگر اینکه مطمئن باشید به آن نیاز دارید.[^1]
<div class="admonition tip" markdown>
<p class="admonition-title">Tips for Android</p>
<p class="admonition-title">نکات برای اندروید</p>
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN kill switch in :gear: **Settings****Network & internet****VPN** → :gear: → **Block connections without VPN**.
@ -139,9 +139,9 @@ On iOS, Orbot has some limitations that could potentially cause crashes or leaks
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute }
<details class="downloads" markdown>
<summary>Downloads</summary>
<summary>دانلود</summary>
- [:simple-appstore: App Store](https://apps.apple.com/app/id519296448)
- [:simple-appstore: اپ استور](https://apps.apple.com/app/id519296448)
</details>
@ -151,4 +151,4 @@ Onion Browser does not provide the same levels of privacy protections as Tor Bro
[Notably](https://github.com/privacyguides/privacyguides.org/issues/2929), Onion Browser does not *guarantee* all requests go through Tor. When using the built-in version of Tor, [your real IP **will** be leaked via WebRTC and audio/video streams](https://onionbrowser.com/faqs) due to limitations of WebKit. It is *safer* to use Onion Browser alongside Orbot, but this still comes with some limitations on iOS (noted in the Orbot section above).
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
[^1]: تنظیم `IsolateDestAddr` در [لیست پستی Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) و [مستندات Stream Isolation در Whonix](https://whonix.org/wiki/Stream_Isolation) مورد بحث قرار گرفته است، جایی که هر دو پروژه پیشنهاد می‌کنند که این روش معمولاً برای اکثر افراد مناسب نیست.