mirror of
https://github.com/privacyguides/i18n.git
synced 2025-11-16 05:12:38 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -80,7 +80,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be
|
|||||||
|
|
||||||
[**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS), as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484), packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Ondersteuning werd voor het eerst toegevoegd in webbrowsers zoals Firefox 60 en Chrome 83.
|
[**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS), as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484), packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Ondersteuning werd voor het eerst toegevoegd in webbrowsers zoals Firefox 60 en Chrome 83.
|
||||||
|
|
||||||
Native implementatie van DoH dook op in iOS 14, macOS 11, Microsoft Windows, en Android 13 (het zal echter niet standaard worden ingeschakeld [](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). Algemene Linux desktop ondersteuning wacht op de systemd [implementatie](https://github.com/systemd/systemd/issues/8639) dus [het installeren van third-party software is nog steeds vereist](../dns.md#linux).
|
Native implementatie van DoH dook op in iOS 14, macOS 11, Microsoft Windows, en Android 13 (het zal echter niet standaard worden ingeschakeld [](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). Algemene Linux desktop ondersteuning wacht op de systemd [implementatie](https://github.com/systemd/systemd/issues/8639) dus [het installeren van software van derden is nog steeds vereist](../dns.md#encrypted-dns-proxies).
|
||||||
|
|
||||||
### Ondersteuning voor besturingssystemen
|
### Ondersteuning voor besturingssystemen
|
||||||
|
|
||||||
@@ -94,7 +94,7 @@ De nieuwste versies van iOS, iPadOS, tvOS en macOS ondersteunen zowel DoT als Do
|
|||||||
|
|
||||||
Na installatie van een configuratieprofiel of een app die gebruik maakt van de DNS Settings API, kan de DNS-configuratie worden geselecteerd. Als een VPN actief is, zal de resolutie binnen de VPN-tunnel de DNS-instellingen van het VPN gebruiken en niet je systeembrede instellingen.
|
Na installatie van een configuratieprofiel of een app die gebruik maakt van de DNS Settings API, kan de DNS-configuratie worden geselecteerd. Als een VPN actief is, zal de resolutie binnen de VPN-tunnel de DNS-instellingen van het VPN gebruiken en niet je systeembrede instellingen.
|
||||||
|
|
||||||
Apple biedt geen native interface voor het maken van versleutelde DNS-profielen. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is een onofficiële tool voor het maken van je eigen versleutelde DNS-profielen, echter worden deze niet ondertekend. Ondertekende profielen hebben de voorkeur; ondertekening valideert de oorsprong van een profiel en helpt de integriteit van de profielen te waarborgen. Een groen "Geverifieerd" label wordt gegeven aan ondertekende configuratieprofielen. Voor meer informatie over het ondertekenen van codes, zie [Over het ondertekenen van codes](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html).
|
Apple biedt geen native interface voor het maken van versleutelde DNS-profielen. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is een onofficieel hulpmiddel voor het maken van je eigen versleutelde DNS-profielen, echter worden deze niet ondertekend. Ondertekende profielen hebben de voorkeur; ondertekening valideert de oorsprong van een profiel en helpt de integriteit van de profielen te waarborgen. Een groen "Geverifieerd" label wordt gegeven aan ondertekende configuratieprofielen. Voor meer informatie over het ondertekenen van codes, zie [Over het ondertekenen van codes](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html).
|
||||||
|
|
||||||
#### Linux
|
#### Linux
|
||||||
|
|
||||||
@@ -124,11 +124,11 @@ In dit voorbeeld zullen we vastleggen wat er gebeurt als we een DoH-verzoek doen
|
|||||||
wireshark -r /tmp/dns_doh.pcap
|
wireshark -r /tmp/dns_doh.pcap
|
||||||
```
|
```
|
||||||
|
|
||||||
We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Als we kijken naar de "toepassings gegevens" pakketten die volgen, bevat geen van hen het domein dat we hebben aangevraagd of het IP adres dat wordt teruggestuurd.
|
We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Als we kijken naar de "toepassingsgegevens" pakketten die volgen, bevat geen van hen het domein dat we hebben aangevraagd of het IP-adres dat wordt teruggestuurd.
|
||||||
|
|
||||||
## Waarom **zou ik geen** versleutelde DNS gebruiken?
|
## Waarom **zou ik geen** versleutelde DNS gebruiken?
|
||||||
|
|
||||||
Op plaatsen waar internet wordt gefilterd (of gecensureerd), kan het bezoeken van verboden bronnen eigen gevolgen hebben waarmee je rekening moet houden in jouw [bedreigingsmodel](../basics/threat-modeling.md). Wij **niet** suggereren het gebruik van gecodeerde DNS voor dit doel. Use [Tor](../advanced/tor-overview.md) or a [VPN](../vpn.md) instead. Als je een VPN gebruikt, moet je de DNS-servers van jouw VPN gebruiken. Wanneer je een VPN gebruikt, vertrouwt je hen al jouw netwerkactiviteiten toe.
|
Op plaatsen waar internet wordt gefilterd (of gecensureerd), kan het bezoeken van verboden bronnen eigen gevolgen hebben waarmee je rekening moet houden in jouw [bedreigingsmodel](../basics/threat-modeling.md). We raden het gebruik van versleutelde DNS voor dit doel **af**. Use [Tor](../advanced/tor-overview.md) or a [VPN](../vpn.md) instead. Als je een VPN gebruikt, moet je de DNS-servers van jouw VPN gebruiken. Wanneer je een VPN gebruikt, vertrouwt je hen al jouw netwerkactiviteiten toe.
|
||||||
|
|
||||||
Wanneer we een DNS lookup doen, is dat meestal omdat we toegang willen tot een bron. Hieronder bespreken we enkele van de methoden die jouw surf-activiteiten kunnen onthullen, zelfs wanneer je versleutelde DNS gebruikt:
|
Wanneer we een DNS lookup doen, is dat meestal omdat we toegang willen tot een bron. Hieronder bespreken we enkele van de methoden die jouw surf-activiteiten kunnen onthullen, zelfs wanneer je versleutelde DNS gebruikt:
|
||||||
|
|
||||||
@@ -180,7 +180,7 @@ Dit betekent dat zelfs als we "Encrypted DNS" servers gebruiken, het domein waar
|
|||||||
|
|
||||||
Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Onlangs is Rusland [begonnen met het blokkeren van buitenlandse websites](https://github.com/net4people/bbs/issues/108) die gebruik maken van de [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) norm. Dit komt doordat het [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol dat deel uitmaakt van HTTP/3 vereist dat `ClientHello` ook gecodeerd wordt.
|
Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Onlangs is Rusland [begonnen met het blokkeren van buitenlandse websites](https://github.com/net4people/bbs/issues/108) die gebruik maken van de [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) norm. Dit komt doordat het [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol dat deel uitmaakt van HTTP/3 vereist dat `ClientHello` ook gecodeerd wordt.
|
||||||
|
|
||||||
### Protocol voor onlinecertificaatstatus (PVOC/OCSP)
|
### Online Certificate Status Protocol (OCSP)
|
||||||
|
|
||||||
Een andere manier waarop jouw browser jouw surfactiviteiten kan onthullen is met het [Online Certificate Status Protocol](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol). Wanneer je een HTTPS-website bezoekt, kan de browser controleren of het [-certificaat](https://en.wikipedia.org/wiki/Public_key_certificate) van de website is ingetrokken. Dit gebeurt over het algemeen via het HTTP-protocol, wat betekent dat het **niet** versleuteld is.
|
Een andere manier waarop jouw browser jouw surfactiviteiten kan onthullen is met het [Online Certificate Status Protocol](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol). Wanneer je een HTTPS-website bezoekt, kan de browser controleren of het [-certificaat](https://en.wikipedia.org/wiki/Public_key_certificate) van de website is ingetrokken. Dit gebeurt over het algemeen via het HTTP-protocol, wat betekent dat het **niet** versleuteld is.
|
||||||
|
|
||||||
|
|||||||
@@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Writing Style
|
title: Schrijfstijl
|
||||||
description: Our official writing style handbook for website contributors.
|
description: Ons officiële schrijfstijlhandboek voor medewerkers aan websites.
|
||||||
---
|
---
|
||||||
|
|
||||||
Privacy Guides is geschreven in Amerikaans Engels, en je dient bij twijfel de [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) te raadplegen.
|
Privacy Guides is geschreven in Amerikaans Engels, en je dient bij twijfel de [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) te raadplegen.
|
||||||
|
|
||||||
In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Wij belichten hieronder enkele belangrijke opmerkingen uit deze richtsnoeren.
|
In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Hieronder lichten we een paar belangrijke opmerkingen uit deze richtlijnen toe.
|
||||||
|
|
||||||
## Schrijven voor ons publiek
|
## Schrijven voor ons publiek
|
||||||
|
|
||||||
|
|||||||
@@ -138,7 +138,7 @@ De opties van Shields kunnen naar behoefte per site worden aangepast, maar stand
|
|||||||
- [x] Selecteer **Automatisch doorsturen van tracking-URL's**
|
- [x] Selecteer **Automatisch doorsturen van tracking-URL's**
|
||||||
- \[x\] (optioneel) Selecteer **Blokkeer scripts** (1)
|
- \[x\] (optioneel) Selecteer **Blokkeer scripts** (1)
|
||||||
- [x] Selecteer **Blokkeer vingerafdrukken**
|
- [x] Selecteer **Blokkeer vingerafdrukken**
|
||||||
- [x] Select **Site Tabs Closed** under *Auto Shred*
|
- [x] Selecteer **Site Tabbladen Gesloten** onder *Auto Shred*
|
||||||
|
|
||||||
<details class="warning" markdown>
|
<details class="warning" markdown>
|
||||||
<summary>Standaard filterlijsten gebruiken</summary>
|
<summary>Standaard filterlijsten gebruiken</summary>
|
||||||
@@ -151,13 +151,13 @@ De opties van Shields kunnen naar behoefte per site worden aangepast, maar stand
|
|||||||
|
|
||||||
1. Deze optie schakelt JavaScript uit, waardoor veel sites niet meer werken. Om dit te verhelpen, kun je uitzonderingen per site instellen door op het schildpictogram in de adresbalk te klikken en deze instelling uit te vinken onder *Geavanceerde besturingselementen*.
|
1. Deze optie schakelt JavaScript uit, waardoor veel sites niet meer werken. Om dit te verhelpen, kun je uitzonderingen per site instellen door op het schildpictogram in de adresbalk te klikken en deze instelling uit te vinken onder *Geavanceerde besturingselementen*.
|
||||||
|
|
||||||
##### Clear browsing data (Android only)
|
##### Browsegegevens wissen (alleen Android)
|
||||||
|
|
||||||
- [x] Selecteer **Gegevens wissen bij het sluiten van de browser**
|
- [x] Selecteer **Gegevens wissen bij het sluiten van de browser**
|
||||||
|
|
||||||
##### Social Media Blocking (Android only)
|
##### Sociale media blokkeren (alleen Android)
|
||||||
|
|
||||||
- [ ] Uncheck alle sociale media componenten uit
|
- [ ] Deselecteer alle sociale media componenten
|
||||||
|
|
||||||
#### Andere privacy-instellingen
|
#### Andere privacy-instellingen
|
||||||
|
|
||||||
@@ -211,12 +211,12 @@ These options can be found in :material-menu:/:fontawesome-solid-ellipsis: → *
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Cromite** is een op Chromium gebaseerde browser met ingebouwde adblocking, vingerafdrukken beschermen en andere [privacy- en veiligheidsverbeteringen] (https://github.com/uazo/cromite/blob/master/docs/FEATURES.md). It is a fork of the discontinued **Bromite** browser.
|
**Cromite** is een op Chromium gebaseerde browser met ingebouwde adblocking, vingerafdrukken beschermen en andere [privacy- en veiligheidsverbeteringen] (https://github.com/uazo/cromite/blob/master/docs/FEATURES.md). Het is een fork van de beëindigde **Bromite** browser.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://cromite.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepagina](https://cromite.org){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://github.com/uazo/cromite/blob/master/docs/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://github.com/uazo/cromite/blob/master/docs/PRIVACY_POLICY.md){ .card-link title="Privacybeleid" }
|
||||||
[:octicons-info-16:](https://github.com/uazo/cromite?tab=readme-ov-file#docs){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://github.com/uazo/cromite?tab=readme-ov-file#docs){ .card-link title="Documentatie" }
|
||||||
[:octicons-code-16:](https://github.com/uazo/cromite){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/uazo/cromite){ .card-link title="Broncode" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
@@ -333,23 +333,23 @@ Apple's privacy policy for Safari states:
|
|||||||
|
|
||||||
> When visiting a webpage, Safari may send information calculated from the webpage address to Apple over OHTTP to determine if relevant highlights are available.
|
> When visiting a webpage, Safari may send information calculated from the webpage address to Apple over OHTTP to determine if relevant highlights are available.
|
||||||
|
|
||||||
#### Settings for Websites
|
#### Instellingen voor websites
|
||||||
|
|
||||||
Under **Camera**
|
Onder **Camera**
|
||||||
|
|
||||||
- [x] Select **Ask**
|
- [x] Selecteer **Vraag**
|
||||||
|
|
||||||
Under **Microphone**
|
Onder **Microfoon**
|
||||||
|
|
||||||
- [x] Select **Ask**
|
- [x] Selecteer **Vraag**
|
||||||
|
|
||||||
Under **Location**
|
Onder **Locatie**
|
||||||
|
|
||||||
- [x] Select **Ask**
|
- [x] Selecteer **Vraag**
|
||||||
|
|
||||||
These settings ensure that websites can only access your camera, microphone, or location after you explicitly grant them access.
|
These settings ensure that websites can only access your camera, microphone, or location after you explicitly grant them access.
|
||||||
|
|
||||||
#### Other Privacy Settings
|
#### Andere privacy-instellingen
|
||||||
|
|
||||||
These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**.
|
These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**.
|
||||||
|
|
||||||
@@ -373,7 +373,7 @@ Open Safari en tik op de knop Tabbladen, rechtsonder. Then, expand the :material
|
|||||||
|
|
||||||
- [x] Selecteer **Privé**
|
- [x] Selecteer **Privé**
|
||||||
|
|
||||||
Safari's Privénavigatie modus biedt extra bescherming van de privacy. Private Browsing gebruikt een nieuwe [kortstondige](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) sessie voor elk tabblad, wat betekent dat tabbladen van elkaar geïsoleerd zijn. There are other smaller privacy benefits with Private Browsing too, such as not sending a webpage’s address to Apple when using Safari's translation feature.
|
De privénavigatiemodus van Safari biedt extra privacybescherming. Private Browsing gebruikt een nieuwe [kortstondige](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) sessie voor elk tabblad, wat betekent dat tabbladen van elkaar geïsoleerd zijn. There are other smaller privacy benefits with Private Browsing too, such as not sending a webpage’s address to Apple when using Safari's translation feature.
|
||||||
|
|
||||||
Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Dit kan een ongemak zijn.
|
Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Dit kan een ongemak zijn.
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
meta_title: "Tor-browser en -netwerk: Anoniem surfen op het web - Privacy Guides"
|
meta_title: "Tor-browser en -netwerk: Anoniem surfen op het web - Privacy Guides"
|
||||||
title: "Tor Browser"
|
title: "Tor Browser"
|
||||||
icon: simple/torbrowser
|
icon: simpel/torbrowser
|
||||||
description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt.
|
description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt.
|
||||||
cover: tor.webp
|
cover: tor.webp
|
||||||
schema:
|
schema:
|
||||||
@@ -23,7 +23,7 @@ schema:
|
|||||||
url: "./"
|
url: "./"
|
||||||
---
|
---
|
||||||
|
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Beschermt tegen de volgende bedreiging(en):</small>
|
||||||
|
|
||||||
- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||||
- [:material-eye-outline: Massabewaking](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
- [:material-eye-outline: Massabewaking](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||||
@@ -54,11 +54,11 @@ If more complete anonymity is paramount to your situation, you should **only** b
|
|||||||
|
|
||||||
**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepagina](https://torproject.org){ .md-button .md-button--primary }
|
||||||
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
||||||
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentatie" }
|
||||||
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Broncode" }
|
||||||
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
|
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Bijdragen" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
@@ -74,13 +74,13 @@ If more complete anonymity is paramount to your situation, you should **only** b
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition danger" markdown>
|
<div class="admonition danger" markdown>
|
||||||
<p class="admonition-title">Danger</p>
|
<p class="admonition-title">Let op</p>
|
||||||
|
|
||||||
Je moet **nooit** extra extensies installeren op Tor Browser of `about:config` instellingen bewerken, inclusief de extensies die we voorstellen voor Firefox. Browserextensies en niet-standaardinstellingen zorgen ervoor dat je je onderscheidt van anderen op het Tor-netwerk, waardoor je browser gemakkelijker te vinden is op [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting).
|
Je moet **nooit** extra extensies installeren op Tor Browser of `about:config` instellingen bewerken, inclusief de extensies die we voorstellen voor Firefox. Browserextensies en niet-standaard instellingen zorgen ervoor dat je je onderscheidt van anderen op het Tor-netwerk, waardoor je browser gemakkelijker te vinden is op [vingerafdruk](https://support.torproject.org/glossary/browser-fingerprinting).
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Anders [worden de beveiligingsinstellingen mogelijk niet volledig toegepast](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), waardoor je een hoger risico loopt op vingerafdrukken en exploitatie dan je zou verwachten op basis van de gekozen instelling.
|
De Tor Browser is ontworpen om vingerafdrukken, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Anders [worden de beveiligingsinstellingen mogelijk niet volledig toegepast](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), waardoor je een hoger risico loopt op vingerafdrukken en exploitatie dan je zou verwachten op basis van de gekozen instelling.
|
||||||
|
|
||||||
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
|
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
|
||||||
|
|
||||||
@@ -92,13 +92,13 @@ In addition to installing Tor Browser on your computer directly, there are also
|
|||||||
|
|
||||||
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser).
|
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser).
|
||||||
|
|
||||||
[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review)
|
[:material-star-box: Lees onze laatste Onion Browser review](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review)
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepagina](https://onionbrowser.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacybeleid" }
|
||||||
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentatie" }
|
||||||
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Broncode" }
|
||||||
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
|
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Bijdragen" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|||||||
@@ -289,33 +289,33 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長
|
|||||||
|
|
||||||
### 要求生物特徵驗證和隱藏應用程式
|
### 要求生物特徵驗證和隱藏應用程式
|
||||||
|
|
||||||
iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown.
|
iOS 提供以 Touch ID/Face ID 或您的密碼來鎖定大部分應用程式的功能,這對於保護本身未提供相關功能的應用程式當中的敏感內容非常有用。 您可以長按應用程式,選擇**需要 Face ID/Touch ID** 來鎖定該應用程式。 開啟以這種方式鎖定的應用程式之前,或是從其他程式存取資料前,將要求進行生物特徵驗證。 此外,被鎖定的應用程式,也不會顯示通知預覽。
|
||||||
|
|
||||||
In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable trade off of hiding an app is that you will not receive any of its notifications.
|
除了以生物特徵鎖定外,您也可以隱藏應用程式,讓它們不會出現在主畫面、應用程式庫、**設定**中的應用程式清單等。 雖然隱藏應用程式在您必須將已解鎖的手機交給他人的情況下可能很有用,但該功能提供的隱藏效果並非絕對,因為隱藏的應用程式在某些地方(例如電量使用清單)仍是可見的。 此外,隱藏應用程式的一個顯著缺點是您將不會收到任何通知。
|
||||||
|
|
||||||
You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability.
|
您可以長按應用程式,然後選擇**要求使用 Face ID/Touch ID**→**隱藏並要求使用 Face ID/Touch ID** 來隱藏應用程式。 請注意,無法隱藏 Apple 內建的應用程式、預設網頁瀏覽器和電子郵件應用程式。 隱藏的應用程式位於應用程式庫底部的**隱藏**資料夾,可使用生物特徵解鎖。 無論您是否隱藏應用程式,此資料夾都會出現在應用程式庫中,這可提供一定程度的合理推諉。
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Redacting Elements in Images
|
### 隱藏圖片中的元素
|
||||||
|
|
||||||
If you need to hide information in a photo, you can use Apple's built-in editing tools to do so.
|
如果想隱藏照片中的資訊,可以使用 Apple 內建的編輯工具。
|
||||||
|
|
||||||
If your device supports it, you can use the [Clean Up](https://support.apple.com/en-us/121429) feature to pixelate faces or remove objects from images.
|
如果您的裝置支援,可以使用[清理](https://support.apple.com/en-us/121429)功能來打馬賽克,或移除影像中的物件。
|
||||||
|
|
||||||
- Open the **Photos** app and tap the photo you have selected for redaction
|
- 開啟**「照片」**應用程式,點擊您想要調整的照片
|
||||||
- Tap the :material-tune: (at the bottom of the screen)
|
- 點擊螢幕底部的 :material-tune:
|
||||||
- Tap the button labeled **Clean Up**
|
- 點擊標示**清除**的按鈕
|
||||||
- Draw a circle around whatever you want to redact. Faces will be pixelated, and it will attempt to delete anything else.
|
- 圈選想要刪減的內容。 臉部會被打馬,其他東西將被清除。
|
||||||
|
|
||||||
Our warning [against blurring text](../data-redaction.md) also applies here, so we recommend to instead add a black shape with 100% opacity over it. In addition to redacting text, you can also black out any face or object using the **Photos** app.
|
我們[針對將文字模糊化的](../data-redaction.md)警告也適用於此,所以建議改為加入不透明度為 100% 的黑色形狀。 除了刪除文字之外,您也可以使用「**照片**」應用程式,將任何臉部或物件塗黑。
|
||||||
|
|
||||||
- Tap the image you have selected for redaction
|
- 點選您想要調整的照片
|
||||||
- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right
|
- 點選螢幕底部的 :material-tune: → 標記符號(右上方)→ 右下方的加號圖示
|
||||||
- Select **Add Shape** and choose the square or circle
|
- 選擇**「新增圖形」**,然後選擇方形或圓形
|
||||||
- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit.
|
- 點擊工具列上的圓形(最左邊的選項),然後選擇黑色填入。 您也可以移動圖形,視情況放大。
|
||||||
|
|
||||||
**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%.
|
**不要**使用螢光筆來隱藏資訊,因為它並非完全不透明。
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -337,4 +337,4 @@ Apple 會為那些希望幫助查找和報告錯誤的人先提供 iOS 測試版
|
|||||||
|
|
||||||
### Before First Unlock(初次解鎖之前)
|
### Before First Unlock(初次解鎖之前)
|
||||||
|
|
||||||
If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. 重啟後**解鎖設備**之前的狀態稱為“首次解鎖之前”(BFU) ,當設備處於該狀態時,取證鑑識工具[明顯更加困難](https://belkasoft.com/checkm8_glossary)利用漏洞訪問您的資料。 此 BFU 狀態允許您接收電話、簡訊和鬧鐘通知,但設備上的大部分資料為加密且無法訪問。 這可能不切實際,因此請考慮權衡這個作法對於自身情況是否有意義。
|
如果您的威脅模式包含鑑識工具的[:material-target-account: 針對式攻擊](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red},而且您希望盡可能降低被利用漏洞來存取手機的機會,請經常重新啟動裝置。 重啟後**解鎖設備**之前的狀態稱為“首次解鎖之前”(BFU) ,當設備處於該狀態時,取證鑑識工具[明顯更加困難](https://belkasoft.com/checkm8_glossary)利用漏洞訪問您的資料。 此 BFU 狀態允許您接收電話、簡訊和鬧鐘通知,但設備上的大部分資料為加密且無法訪問。 這可能不切實際,因此請考慮權衡這個作法對於自身情況是否有意義。
|
||||||
|
|||||||
@@ -56,7 +56,7 @@ Linux 有一些值得注意的安全問題,您應該注意。 儘管有這些
|
|||||||
|
|
||||||
因此 Silverblue 和 NixOS 等 [發行版](../desktop.md#atomic-distributions) 在這種情況下便可以依靠原子更新模式維持系統穩定性。 [Adam Šamalík](https://twitter.com/adsamalik) 介紹 `rpm-ostree` 如何與 Silverblue 搭配使用:
|
因此 Silverblue 和 NixOS 等 [發行版](../desktop.md#atomic-distributions) 在這種情況下便可以依靠原子更新模式維持系統穩定性。 [Adam Šamalík](https://twitter.com/adsamalik) 介紹 `rpm-ostree` 如何與 Silverblue 搭配使用:
|
||||||
|
|
||||||
- [Let's try Fedora Silverblue — an immutable desktop OS! - Adam Šamalík](https://youtu.be/-hpV5l-gJnQ) <small>(YouTube)</small>
|
- [試試 Fedora Silverblue!— 一套不變的桌機作業系統! - Adam Šamalík](https://youtu.be/-hpV5l-gJnQ) <small>(YouTube)</small>
|
||||||
|
|
||||||
### 「注重安全」的發行版
|
### 「注重安全」的發行版
|
||||||
|
|
||||||
@@ -119,7 +119,7 @@ Linux 發行版,如 [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)
|
|||||||
|
|
||||||
### 權限控制
|
### 權限控制
|
||||||
|
|
||||||
Desktop environments that support the [Wayland](https://wayland.freedesktop.org) display protocol are [more secure](https://lwn.net/Articles/589147) than those that only support X11. Moreover, we *generally* recommend installing and using applications which are sandboxed such as those obtained via **Flatpak**. Flatpak supports the [`security-context-v1`](https://github.com/flatpak/flatpak/pull/4920) protocol and the ability to filter D-Bus protocols, which allow Flatpak to properly identify apps for the purpose of sandboxing them through permission controls.[^1] Conversely, applications outside sandboxes are free to perform privileged actions such as capturing your screen, either by [overwriting the portal permission store](https://invent.kde.org/plasma/xdg-desktop-portal-kde/-/issues/7#note_1112260), or [making use of privileged Wayland protocols](https://github.com/swaywm/sway/pull/7648#issuecomment-2507730794).
|
支援 [Wayland](https://wayland.freedesktop.org) 顯示通訊協定的桌面環境,比只支援 X11 的桌面環境[更安全](https://lwn.net/Articles/589147)。 此外,我們*一般*都建議安裝和使用將應用程式封裝於沙盒內的軟體,例如透過 **Flatpak** 取得的應用程式。 Flatpak 支援 [`security-context-v1`](https://github.com/flatpak/flatpak/pull/4920) 通訊協定與過濾 D-Bus 通訊協定的能力,讓 Flatpak 可以正確識別應用程式,以透過權限控制將其放置於沙盒中運作。[^1]相反地,沙盒外的應用程式可自由執行需權限的行為,例如透過[覆寫入口的權限儲存空間](https://invent.kde.org/plasma/xdg-desktop-portal-kde/-/issues/7#note_1112260),或是[利用高權限的 Wayland 通訊協定](https://github.com/swaywm/sway/pull/7648#issuecomment-2507730794)來擷取您的螢幕畫面。
|
||||||
|
|
||||||
## 隱私微調
|
## 隱私微調
|
||||||
|
|
||||||
@@ -168,4 +168,4 @@ Fedora 專案使用 [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Bette
|
|||||||
|
|
||||||
openSUSE 則是使用[唯一的 ID](https://en.opensuse.org/openSUSE:Statistics) 來計算系統,可以通過清空`/var/lib/zypp/AnonymousUniqueId` 此檔案來禁用。
|
openSUSE 則是使用[唯一的 ID](https://en.opensuse.org/openSUSE:Statistics) 來計算系統,可以通過清空`/var/lib/zypp/AnonymousUniqueId` 此檔案來禁用。
|
||||||
|
|
||||||
[^1]: This exposes a reliable way for Wayland compositors to get identifying information about a client. Compositors can then apply security policies if desirable. [https://github.com/flatpak/flatpak/commit/f0e626a4b60439f211f06d35df74b675a9ef42f4](https://github.com/flatpak/flatpak/commit/f0e626a4b60439f211f06d35df74b675a9ef42f4)
|
[^1]: 這提供一個讓 Wayland 合成器能可靠地取得客戶端的識別資訊的方法。 然後在需要的時候,合成器可以套用安全政策。 [https://github.com/flatpak/flatpak/commit/f0e626a4b60439f211f06d35df74b675a9ef42f4](https://github.com/flatpak/flatpak/commit/f0e626a4b60439f211f06d35df74b675a9ef42f4)
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ description: macOS 是蘋果電腦的桌面作業系統,搭配其自家硬體
|
|||||||
|
|
||||||
蘋果公司使用 Unix 作業系統來開發**macOS** 支援自家的 Mac 電腦。 為提高 macOS 隱私,用戶可關閉遙測功能以強化現有的隱私與安全設定。
|
蘋果公司使用 Unix 作業系統來開發**macOS** 支援自家的 Mac 電腦。 為提高 macOS 隱私,用戶可關閉遙測功能以強化現有的隱私與安全設定。
|
||||||
|
|
||||||
舊款的 Intel-based Macs 與 Hackintoshe 則無法完全支援 macOS 所提供的安全功能。 To enhance data security, we recommend using a newer Mac with [Apple Silicon](https://support.apple.com/HT211814).
|
舊款的 Intel-based Macs 與 Hackintoshe 則無法完全支援 macOS 所提供的安全功能。 為了加強資料安全性,建議使用[Apple Silicon](https://support.apple.com/HT211814)晶片的新款 Mac。
|
||||||
|
|
||||||
## 隱私筆記
|
## 隱私筆記
|
||||||
|
|
||||||
@@ -14,7 +14,7 @@ description: macOS 是蘋果電腦的桌面作業系統,搭配其自家硬體
|
|||||||
|
|
||||||
### 激活鎖
|
### 激活鎖
|
||||||
|
|
||||||
Brand-new Apple Silicon devices can be set up without an internet connection. 但是,恢復或重置 Mac 將**需要**連接到 Apple 伺服器,以檢查丟失或被盜設備資料庫的激活鎖。
|
全新 Apple Silicon 裝置可不需網際網路連線即可設定。 但是,恢復或重置 Mac 將**需要**連接到 Apple 伺服器,以檢查丟失或被盜設備資料庫的激活鎖。
|
||||||
|
|
||||||
### 應用程式撤銷檢查
|
### 應用程式撤銷檢查
|
||||||
|
|
||||||
@@ -46,7 +46,7 @@ Apple 的 OCSP 服務使用 HTTPS 加密,因此只有他們能夠看到您開
|
|||||||
|
|
||||||
#### 藍牙
|
#### 藍牙
|
||||||
|
|
||||||
- [ ] Turn off **Bluetooth** (unless you are currently using it)
|
- [ ] 關閉**藍牙**(除非目前正在使用)
|
||||||
|
|
||||||
#### 網路
|
#### 網路
|
||||||
|
|
||||||
@@ -54,25 +54,25 @@ Apple 的 OCSP 服務使用 HTTPS 加密,因此只有他們能夠看到您開
|
|||||||
|
|
||||||
單擊網路名稱旁邊的“詳細資訊”按鈕:
|
單擊網路名稱旁邊的“詳細資訊”按鈕:
|
||||||
|
|
||||||
- [x] Select **Rotating** under **Private Wi-Fi address**
|
- [x] 在**私人 Wi-Fi 位址**下選擇**輪替**
|
||||||
|
|
||||||
- [x] Turn on **Limit IP address tracking**
|
- [x] 開啟**限制 IP 位址追蹤**
|
||||||
|
|
||||||
##### 防火牆
|
##### 防火牆
|
||||||
|
|
||||||
防火牆會阻止不必要的網路連接。 防火牆設定越嚴格,您的 Mac 就越安全。 然而某些服務可能會被封鎖。 您應該將防火牆配置得盡可能嚴格,但不會影響使用的服務。
|
防火牆會阻止不必要的網路連接。 防火牆設定越嚴格,您的 Mac 就越安全。 然而某些服務可能會被封鎖。 您應該將防火牆配置得盡可能嚴格,但不會影響使用的服務。
|
||||||
|
|
||||||
- [x] Turn on **Firewall**
|
- [x] 開啟**防火牆**
|
||||||
|
|
||||||
點擊 **生成(Generate)** 按鈕。
|
點擊 **生成(Generate)** 按鈕。
|
||||||
|
|
||||||
- [x] Turn on **Block all incoming connections**
|
- [x] 勾選**封鎖所有傳入連線**
|
||||||
|
|
||||||
如果配置過於嚴格,可以再回來取消勾選此選項。 但如果應用程式請求,macOS 通常會提示用戶允許該應用的傳入連接。
|
如果配置過於嚴格,可以再回來取消勾選此選項。 但如果應用程式請求,macOS 通常會提示用戶允許該應用的傳入連接。
|
||||||
|
|
||||||
#### 一般設定
|
#### 一般設定
|
||||||
|
|
||||||
您的設備名稱預設為“[您的名字] 的 iMac”。 Because this name is [publicly broadcast on your network](https://support.apple.com/guide/mac-help/change-computers-local-hostname-mac-mchlp2322/26/mac/26#:~:text=The%20local%20hostname%2C%20or%20local%20network%20name%2C%20is%20displayed%20at%20the%20bottom%20of%20the%20Sharing%20settings%20window.%20It%20identifies%20your%20Mac%20to%20Bonjour%2Dcompatible%20services.), you'll want to change your device name to something generic like "Mac".
|
您的設備名稱預設為“[您的名字] 的 iMac”。 由於此名稱會[在您的網路上公開廣播](https://support.apple.com/guide/mac-help/change-computers-local-hostname-mac-mchlp2322/26/mac/26#:~:text=The%20local%20hostname%2C%20or%20local%20network%20name%2C%20is%20displayed%20at%20the%20bottom%20of%20the%20Sharing%20settings%20window.%20It%20identifies%20your%20Mac%20to%20Bonjour%2Dcompatible%20services.),因此需將裝置名稱更改為通用名稱,例如「Mac」。
|
||||||
|
|
||||||
單擊**關於**,然後在**名稱**欄位上輸入想取的設備名稱。
|
單擊**關於**,然後在**名稱**欄位上輸入想取的設備名稱。
|
||||||
|
|
||||||
@@ -82,30 +82,30 @@ Apple 的 OCSP 服務使用 HTTPS 加密,因此只有他們能夠看到您開
|
|||||||
|
|
||||||
點擊 :material-information-outline: **自動更新** 旁邊的小圖標:
|
點擊 :material-information-outline: **自動更新** 旁邊的小圖標:
|
||||||
|
|
||||||
- [x] Turn on **Download new updates when available**
|
- [x] 開啟**更新推出時就下載**
|
||||||
|
|
||||||
- [x] Turn on **Install macOS updates**
|
- [x] 開啟**安裝 macOS 更新**
|
||||||
|
|
||||||
- [x] Turn on **Install Security Responses and system files**
|
- [x] 開啟**安裝安全回應與系統檔案**
|
||||||
|
|
||||||
#### Apple Intelligence & Siri
|
#### Apple Intelligence 與 Siri
|
||||||
|
|
||||||
If you do not use these features on macOS, you should disable them:
|
如果您在 macOS 上不使用這些功能,應該關閉:
|
||||||
|
|
||||||
- [ ] Turn off **Apple Intelligence**
|
- [ ] 關閉 **Apple Intelligence**
|
||||||
- [ ] 關閉 **Siri**
|
- [ ] 關閉 **Siri**
|
||||||
|
|
||||||
**[Apple Intelligence](https://apple.com/legal/privacy/data/en/intelligence-engine)** is only available if your device supports it. Apple Intelligence uses a combination of on-device processing and their [Private Cloud Compute](https://security.apple.com/blog/private-cloud-compute) for things that take more processing power than your device can provide.
|
只有在您的裝置支援 **[Apple Intelligence](https://apple.com/legal/privacy/data/en/intelligence-engine)** 時才能使用它。 Apple Intelligence 結合裝置內處理與它們的[私人雲端運算](https://security.apple.com/blog/private-cloud-compute)功能,以處理需要比裝置所能提供還更多處理能力的事情。
|
||||||
|
|
||||||
To see a report of all the data sent via Apple Intelligence, you can navigate to **Privacy & Security** → **Apple Intelligence Report** and press **Export Activity** to see activity from the either the last 15 minutes or 7 days, depending on what you set it for. Similar to the **App Privacy Report** which shows you the recent permissions accessed by the apps on your phone, the Apple Intelligence Report likewise shows what is being sent to Apple's servers while using Apple Intelligence.
|
若要查閱透過 Apple Intelligence 傳送的所有資料報告,您可以到 **隱私權與安全性** → **Apple Intelligence 報告**,然後按下**匯出活動**,即可查看過去 15 分鐘或 7 天內的活動,視您的設定而定。 與會顯示您手機上的應用程式近期存取的權限的**應用程式隱私權報告**類似,Apple Intelligence 報告也會顯示使用 Apple Intelligence 時,有哪些資料被送到 Apple 的伺服器。
|
||||||
|
|
||||||
By default, ChatGPT integration is disabled. If you don't want ChatGPT integration anymore, you can navigate to **ChatGPT**:
|
預設情況下,ChatGPT 整合功能是關閉的。 如果您不想再使用 ChatGPT 整合功能了,可以切換到 **ChatGPT**:
|
||||||
|
|
||||||
- [ ] Turn off **Use ChatGPT**
|
- [ ] 關閉 **使用 ChatGPT**
|
||||||
|
|
||||||
You can also have it ask for confirmation every time if you leave ChatGPT integration on:
|
如果您維持開啟 ChatGPT 整合功能,也可以讓它每次都要求確認:
|
||||||
|
|
||||||
- [x] Turn on **Confirm Requests**
|
- [x] 開啟**確認請求**
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">警告</p>
|
<p class="admonition-title">警告</p>
|
||||||
|
|||||||
@@ -2,14 +2,14 @@
|
|||||||
*[ADB]: Android Debug Bridge
|
*[ADB]: Android Debug Bridge
|
||||||
*[AOSP]: Android open-source project
|
*[AOSP]: Android open-source project
|
||||||
*[ATA]: Advanced Technology Attachment
|
*[ATA]: Advanced Technology Attachment
|
||||||
*[aanvalsoppervlakte]: The total number of possible entry points for unauthorized access to a system
|
*[aanvalsoppervlakte]: Het totale aantal mogelijke ingangen voor onbevoegde toegang tot een systeem
|
||||||
*[AVB]: Android Verified Boot
|
*[AVB]: Android Verified Boot
|
||||||
*[cgroups]: Control Groups
|
*[cgroups]: Control Groups
|
||||||
*[CLI]: Command Line Interface
|
*[CLI]: Command Line Interface
|
||||||
*[CSV]: Comma-Separated Values
|
*[CSV]: Comma-Separated Values
|
||||||
*[CVE]: Common Vulnerabilities and Exposures
|
*[CVE]: Common Vulnerabilities and Exposures
|
||||||
*[dark pattern]: Een misleidend ontwerp bedoeld om een gebruiker dingen te laten doen die zelf niet willen
|
*[dark pattern]: Een misleidend ontwerp bedoeld om een gebruiker dingen te laten doen die zelf niet willen
|
||||||
*[digital legacy feature]: Digital Legacy refers to features that allow you to give other people access to your data when you die
|
*[digitale nalatenschap functie]: Digitale nalatenschap verwijst naar functies waarmee je andere mensen toegang kunt geven tot je gegevens als je overlijdt
|
||||||
*[DNSSEC]: Domain Name System Security Extensions
|
*[DNSSEC]: Domain Name System Security Extensions
|
||||||
*[DNS]: Domain Name System
|
*[DNS]: Domain Name System
|
||||||
*[DoH]: DNS over HTTPS
|
*[DoH]: DNS over HTTPS
|
||||||
@@ -27,17 +27,17 @@
|
|||||||
*[FDE]: Full Disk Encryption
|
*[FDE]: Full Disk Encryption
|
||||||
*[FIDO]: Fast IDentity Online
|
*[FIDO]: Fast IDentity Online
|
||||||
*[FS]: Forward Secrecy
|
*[FS]: Forward Secrecy
|
||||||
*[fork]: A new software project created by copying an existing project and adding to it independently
|
*[fork]: Een nieuw softwareproject dat wordt gemaakt door een bestaand project te kopiëren en er zelfstandig iets aan toe te voegen.
|
||||||
*[GDPR]: General Data Protection Regulation
|
*[GDPR]: General Data Protection Regulation
|
||||||
*[GPG]: GNU Privacy Guard (PGP implementation)
|
*[GPG]: GNU Privacy Guard (PGP implementation)
|
||||||
*[GPS]: Global Positioning System
|
*[GPS]: Global Positioning System
|
||||||
*[GUI]: Graphical User Interface
|
*[GUI]: Graphical User Interface
|
||||||
*[GnuPG]: GNU Privacy Guard (PGP implementation)
|
*[GnuPG]: GNU Privacy Guard (PGP implementation)
|
||||||
*[HDD]: Hard Disk Drive
|
*[HDD]: Hard Disk Drive
|
||||||
*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password
|
*[HOTP]: HMAC (Hash-based Message Authentication Code) gebaseerd eenmalig wachtwoord
|
||||||
*[HTTPS]: Hypertext Transfer Protocol Secure
|
*[HTTPS]: Hypertext Transfer Protocol Secure
|
||||||
*[HTTP]: Hypertext Transfer Protocol
|
*[HTTP]: Hypertext Transfer Protocol
|
||||||
*[hypervisor]: Computer software, firmware, or hardware that splits the resources of a CPU among multiple operating systems
|
*[hypervisor]: Computersoftware, firmware of hardware die de resources van een CPU verdeelt over meerdere besturingssystemen
|
||||||
*[ICCID]: Integrated Circuit Card Identifier
|
*[ICCID]: Integrated Circuit Card Identifier
|
||||||
*[IMAP]: Internet Message Access Protocol
|
*[IMAP]: Internet Message Access Protocol
|
||||||
*[IMEI]: International Mobile Equipment Identity
|
*[IMEI]: International Mobile Equipment Identity
|
||||||
@@ -48,9 +48,9 @@
|
|||||||
*[ISP]: Internet Service Provider
|
*[ISP]: Internet Service Provider
|
||||||
*[ISPs]: Internet Service Providers
|
*[ISPs]: Internet Service Providers
|
||||||
*[JNI]: Java Native Interface
|
*[JNI]: Java Native Interface
|
||||||
*[KYC]: Know Your Customer (ken uw klant)
|
*[KYC]: Know Your Customer (ken je klant)
|
||||||
*[LLaVA]: Large Language and Vision Assistant (multimodal AI model)
|
*[LLaVA]: Large Language and Vision Assistant (multimodaal AI-model)
|
||||||
*[LLMs]: Large Language Models (AI models such as ChatGPT)
|
*[LLMs]: Large Language Models (AI-modellen zoals ChatGPT)
|
||||||
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
|
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
|
||||||
*[MAC]: Media Access Control
|
*[MAC]: Media Access Control
|
||||||
*[MDAG]: Microsoft Defender Application Guard
|
*[MDAG]: Microsoft Defender Application Guard
|
||||||
@@ -64,7 +64,7 @@
|
|||||||
*[OCSP]: Online Certificate Status Protocol
|
*[OCSP]: Online Certificate Status Protocol
|
||||||
*[OEM]: Original Equipment Manufacturer
|
*[OEM]: Original Equipment Manufacturer
|
||||||
*[OEMs]: Original Equipment Manufacturers
|
*[OEMs]: Original Equipment Manufacturers
|
||||||
*[open-weights]: An open weights-model is an AI model that anyone can download and use, but for which the underlying training data and/or algorithms are proprietary.
|
*[open-weights]: Een open weights-model is een AI-model dat iedereen kan downloaden en gebruiken, maar waarvan de onderliggende trainingsgegevens en/of algoritmen gepatenteerd zijn.
|
||||||
*[OS]: Operating System
|
*[OS]: Operating System
|
||||||
*[OTP]: One-Time Password
|
*[OTP]: One-Time Password
|
||||||
*[OTPs]: One-Time Passwords
|
*[OTPs]: One-Time Passwords
|
||||||
@@ -72,7 +72,7 @@
|
|||||||
*[P2P]: Peer-to-Peer
|
*[P2P]: Peer-to-Peer
|
||||||
*[PAM]: Linux Pluggable Authentication Modules
|
*[PAM]: Linux Pluggable Authentication Modules
|
||||||
*[POP3]: Post Office Protocol 3
|
*[POP3]: Post Office Protocol 3
|
||||||
*[PGP]: Pretty Good Privacy (see OpenPGP)
|
*[PGP]: Pretty Good Privacy (zie OpenPGP)
|
||||||
*[PII]: Personally Identifiable Information
|
*[PII]: Personally Identifiable Information
|
||||||
*[QNAME]: Qualified Name
|
*[QNAME]: Qualified Name
|
||||||
*[QUIC]: A network protocol based on UDP, but aiming to combine the speed of UDP with the reliability of TCP.
|
*[QUIC]: A network protocol based on UDP, but aiming to combine the speed of UDP with the reliability of TCP.
|
||||||
|
|||||||
Reference in New Issue
Block a user