mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-16 07:51:13 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
parent
2d49ca2e84
commit
fe7ca245bf
@ -105,7 +105,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是
|
||||
|
||||
**背景 App 重新整理**可將應用程式在不使用時刷新其內容。 這可能會導致它們建立不必要的連接。 關閉此功能還可節省電池壽命,但可能會影響應用程式接收更新資訊的能力,特別是天氣和消息傳遞的應用。
|
||||
|
||||
選擇 **背景 App 重新整理** 並切掉無需在背景下繼續刷新的應用。 If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**.
|
||||
選擇 **背景 App 重新整理** 並切掉無需在背景下繼續刷新的應用。 若不想讓任何 apps 在背景刷新,可再次選擇 **背景 App 重新整理** 並將其 **關閉**。
|
||||
|
||||
#### Siri & 尋找
|
||||
|
||||
@ -138,25 +138,25 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是
|
||||
- [ ] 關閉**回覆漏接來電**
|
||||
- [ ] 關閉 **USB 配件**
|
||||
|
||||
iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
|
||||
iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長時間; 然而,過去已經有一些漏洞可以繞開這個問題。 為了更加安全,可將手機設置為在 10 次密碼嘗試錯誤後自行擦除。
|
||||
|
||||
!!! warning "警告"
|
||||
|
||||
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.
|
||||
啟用此設置後,別人可以通過多次輸入錯誤密碼來故意擦除您的手機。 確保有適當備份,並且僅在有把握的情況下才啟用此設置。
|
||||
|
||||
- [x] Turn on **Erase Data**
|
||||
- [x] 打開 **清除資料**
|
||||
|
||||
#### 隱私
|
||||
|
||||
**Location Services** allows you to use features like Find My and Maps. If you don't need these features, you can disable Location Services. Alternatively, you can review and pick which apps can use your location here. Select **Location Services**:
|
||||
**定位服務**可用在“尋找”和“地圖”等功能。 如果不需要這些功能,可以禁用定位服務。 或者,可以在此處查看並選擇哪些應用程式可以使用您的位置資訊。 選擇 **位置服務**:
|
||||
|
||||
- [ ] 關閉 **定位服務**
|
||||
|
||||
You can decide to allow apps to request to **track** you here. Disabling this disallows all apps from tracking you with your phone's advertising ID. Select **Tracking**:
|
||||
您在此處決定是否讓 apps **追蹤**活動。 關閉此功能可禁止所有應用程序利用手機的廣告 ID 進行跟踪。 選擇 **追蹤**:
|
||||
|
||||
- [ ] Turn off **Allow Apps to Request to Track**
|
||||
- [ ] 關閉 **App 追蹤活動請求k**
|
||||
|
||||
You should turn off **Research Sensor & Usage Data** if you don't wish to participate in studies. Select **Research Sensor & Usage Data**:
|
||||
如果不想加入,請關閉 **感應 & 使用資料研究** 。 選擇 **感應 & 使用資料研究**:
|
||||
|
||||
- [ ] 關閉 **感應器 & 使用資料收集**
|
||||
|
||||
|
@ -148,19 +148,19 @@ You open up your Terminal and enter this command to randomize your MAC address:
|
||||
openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether
|
||||
```
|
||||
|
||||
en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen.
|
||||
en1 is the name of the interface you're changing the MAC address for. 這可能並不適合每台 Mac,因此要進行檢查,可以按住 option 鍵並單擊螢幕右上角的 Wi-Fi 符號。
|
||||
|
||||
這將在重新開機時重置。
|
||||
|
||||
## 安全保護
|
||||
|
||||
macOS employs defense in depth by relying on multiple layers of software and hardware-based protections, with different properties. This ensures that a failure in one layer does not compromise the system's overall security.
|
||||
macOS 通過不同屬性的多層軟體和硬體保護來進行深度防禦。 這確保了某一層故障不會損害系統的整體安全性。
|
||||
|
||||
### 軟體安全
|
||||
|
||||
!!! warning "警告"
|
||||
|
||||
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
|
||||
macOS 可以安裝測試版更新。 但它們是不穩定的,可能帶有額外遙測,因為其用於測試目的。 Because of this, we recommend you avoid beta software in general.
|
||||
|
||||
#### Signed System Volume
|
||||
|
||||
@ -209,21 +209,21 @@ Apple's SoCs focus on minimizing attack surface by relegating security functions
|
||||
|
||||
#### Boot ROM
|
||||
|
||||
macOS prevents malware persistence by only allowing official Apple software to run at boot time; this is known as secure boot. Mac computers verify this with a bit of read-only memory on the SoC called the boot ROM, which is laid down during the manufacturing of the chip.
|
||||
macOS 通過僅允許官方 Apple 軟件在啟動時運行以防止惡意軟體持久存在; 此稱為安全開機。 Mac computers verify this with a bit of read-only memory on the SoC called the boot ROM, which is laid down during the manufacturing of the chip.
|
||||
|
||||
The boot ROM forms the hardware root of trust. This ensures that malware cannot tamper with the boot process. When your Mac boots up, the boot ROM is the first thing that runs, forming the first link in the chain of trust.
|
||||
The boot ROM forms the hardware root of trust. 這確保惡意軟體無法篡改開機過程。 Mac 啟動時,開機 ROM 第一個運行,為信任鏈中的第一個環節。
|
||||
|
||||
Mac computers can be configured to boot in three security modes: *Full Security*, *Reduced Security*, and *Permissive Security*, with the default setting being Full Security. You should ideally be using Full Security mode and avoid things like **kernel extensions** that force you to lower your security mode. Make sure to [check](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac) that you're using Full Security mode.
|
||||
Mac 電腦有三種安全模式啟動:*完全安全*、*降低安全性*和*許可安全*,預設的設置為完全安全。 理想情況下,您應該使用完全安全模式,並避免諸如**內核擴展**而迫使降低安全模式。 請務必[檢查](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac)使用的是完全安全模式。
|
||||
|
||||
#### Secure Enclave
|
||||
|
||||
The Secure Enclave is a security chip built into devices with Apple silicon which is responsible for storing and generating encryption keys for data at rest as well as Face ID and Touch ID data. It contains its own separate boot ROM.
|
||||
安全隔離區是內置於 Apple silicon 設備的安全晶片,負責存儲和生成靜態資料以及 Face ID 和 Touch ID 資料的加密密鑰。 它包含自己獨立的開機 ROM。
|
||||
|
||||
You can think of the Secure Enclave as your device's security hub: it has an AES encryption engine and a mechanism to securely store your encryption keys, and it's separated from the rest of the system, so even if the main processor is compromised, it should still be safe.
|
||||
您可以將安全隔離區想成設備的安全中心:它具有 AES 加密引擎和安全存儲加密密鑰機制,它與系統的其餘部分分開,因此即使主處理器受到損害,也仍然保持安全。
|
||||
|
||||
#### Touch ID
|
||||
|
||||
Apple's Touch ID feature allows you to securely unlock your devices using biometrics.
|
||||
Apple Touch ID 功能可使用生物識別技術安全地解鎖設備。
|
||||
|
||||
Your biometric data never leaves your device; it's stored only in the Secure Enclave.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user