mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-16 07:51:13 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
parent
a9ae7ca9a5
commit
ff1128f8b8
@ -3,7 +3,7 @@ title: Job Openings
|
||||
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
|
||||
---
|
||||
|
||||
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause.
|
||||
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause.
|
||||
|
||||
We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below.
|
||||
|
||||
|
@ -161,7 +161,7 @@ To check the authenticity and safety of the model, look for:
|
||||
- Community reviews and usage statistics
|
||||
- A "Safe" badge next to the model file (Hugging Face only)
|
||||
- Matching checksums[^1]
|
||||
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
|
||||
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
|
||||
|
||||
A downloaded model is generally safe if it satisfies all the above checks.
|
||||
|
||||
|
@ -38,7 +38,7 @@ There are also many private alternatives to the apps that come pre-installed on
|
||||
|
||||
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
|
||||
|
||||
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
|
||||
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require more permissive SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
|
||||
|
||||
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:
|
||||
|
||||
|
@ -86,26 +86,26 @@ If you download APK files to install manually, you can verify their signature wi
|
||||
|
||||
3. Extract the downloaded archive:
|
||||
|
||||
```bash
|
||||
unzip commandlinetools-*.zip
|
||||
cd cmdline-tools
|
||||
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
||||
```
|
||||
```bash
|
||||
unzip commandlinetools-*.zip
|
||||
cd cmdline-tools
|
||||
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
||||
```
|
||||
|
||||
4. Run the signature verification command:
|
||||
|
||||
```bash
|
||||
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
||||
```
|
||||
```bash
|
||||
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
||||
```
|
||||
|
||||
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
|
||||
|
||||
```bash
|
||||
Signer #1 certificate DN: CN=GrapheneOS
|
||||
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
||||
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
||||
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
||||
```
|
||||
```bash
|
||||
Signer #1 certificate DN: CN=GrapheneOS
|
||||
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
||||
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
||||
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
||||
```
|
||||
|
||||
## F-Droid
|
||||
|
||||
|
@ -101,7 +101,7 @@ If you use iOS and are at high-risk, we have three additional suggestions for yo
|
||||
|
||||
2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.
|
||||
|
||||
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
|
||||
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
|
||||
|
||||
3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).
|
||||
|
||||
|
@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc
|
||||
**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud.
|
||||
|
||||
[:octicons-home-16: Hemsida](https://onlyoffice.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Integritetspolicy" }
|
||||
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Dokumentation}
|
||||
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Källkod" }
|
||||
:octicons-eye-16:{ .card-link title="Integritetspolicy" }
|
||||
:octicons-info-16:{ .card-link title=Dokumentation}
|
||||
:octicons-code-16:{ .card-link title="Källkod" }
|
||||
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
@ -6,13 +6,13 @@ description: iOS is a mobile operating system developed by Apple for the iPhone.
|
||||
|
||||
**iOS** and **iPadOS** are proprietary mobile operating systems developed by Apple for their iPhone and iPad products, respectively. If you have an Apple mobile device, you can increase your privacy by disabling some built-in telemetry features, and hardening some privacy and security settings which are built in to the system.
|
||||
|
||||
## Privacy Notes
|
||||
## Integritetsanmärkningar
|
||||
|
||||
iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways.
|
||||
|
||||
We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services.
|
||||
|
||||
### Activation Lock
|
||||
### Aktiveringslås
|
||||
|
||||
All iOS devices must be checked against Apple's Activation Lock servers when they are initially set up or reset, meaning an internet connection is **required** to use an iOS device.
|
||||
|
||||
|
@ -1,18 +1,18 @@
|
||||
---
|
||||
title: macOS Overview
|
||||
title: macOS Översikt
|
||||
icon: material/apple-finder
|
||||
description: macOS is Apple's desktop operating system that works with their hardware to provide strong security.
|
||||
description: macOS är Apples operativsystem för datorer som är integrerat med deras egen hårdvara för att ge ökad säkerhet.
|
||||
---
|
||||
|
||||
**macOS** är ett Unix-baserat operativsystem utvecklat av Apple för deras Macdatorer. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings.
|
||||
**macOS** är ett Unix-baserat operativsystem utvecklat av Apple för deras Macdatorer. För att förbättra integriteten på macOS kan du inaktivera telemetrifunktioner och skärpa de befintliga integritets- och säkerhetsinställningar.
|
||||
|
||||
Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple Silicon](https://support.apple.com/HT211814).
|
||||
Äldre Intel-baserade Mac-datorer och Hackintosh-datorer stödjer inte alla säkerhetsfunktioner som macOS erbjuder. För att maximera datasäkerheten rekommenderar vi att du använder en nyare Macdator med [Apple Silicon.](https://support.apple.com/HT211814)
|
||||
|
||||
## Privacy Notes
|
||||
## Integritetsanmärkningar
|
||||
|
||||
There are a few notable privacy concerns with macOS that you should consider. These pertain to the operating system itself, and not Apple's other apps and services.
|
||||
Det finns några anmärkningsvärda integritetsproblem med macOS som du bör tänka på. Dessa gäller själva operativsystemet och inte Apples övriga appar och tjänster.
|
||||
|
||||
### Activation Lock
|
||||
### Aktiveringslås
|
||||
|
||||
Brand-new Apple Silicon devices can be set up without an internet connection. However, recovering or resetting your Mac will **require** an internet connection to Apple's servers to check against the Activation Lock database of lost or stolen devices.
|
||||
|
||||
|
@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th
|
||||
#### Device Guard
|
||||
|
||||
- Turn On Virtualization Based Security: **Enabled**
|
||||
- Platform Security Level: **Secure Boot and DMA Protection**
|
||||
- Secure Launch Configuration: **Enabled**
|
||||
- Platform Security Level: **Secure Boot and DMA Protection**
|
||||
- Secure Launch Configuration: **Enabled**
|
||||
|
||||
#### Internet Communication Management
|
||||
|
||||
@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform
|
||||
- Turn off AutoPlay: **Enabled**
|
||||
- Disallow Autoplay for nonvolume devices: **Enabled**
|
||||
- Set the default behavior for AutoRun: **Enabled**
|
||||
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
|
||||
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
|
||||
|
||||
#### BitLocker Drive Encryption
|
||||
|
||||
You may wish to re-encrypt your operating system drive after changing these settings.
|
||||
|
||||
- Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled**
|
||||
- Select the encryption method: **AES-256**
|
||||
- Select the encryption method: **AES-256**
|
||||
|
||||
Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows.
|
||||
|
||||
@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b
|
||||
#### Data Collection and Preview Builds
|
||||
|
||||
- Allow Diagnostic Data: **Enabled**
|
||||
- Options: **Send required diagnostic data** (Pro Edition); or
|
||||
- Options: **Diagnostic data off** (Enterprise or Education Edition)
|
||||
- Options: **Send required diagnostic data** (Pro Edition); or
|
||||
- Options: **Diagnostic data off** (Enterprise or Education Edition)
|
||||
- Limit Diagnostic Log Collection: **Enabled**
|
||||
- Limit Dump Collection: **Enabled**
|
||||
- Limit optional diagnostic data for Desktop Analytics: **Enabled**
|
||||
- Options: **Disable Desktop Analytics collection**
|
||||
- Options: **Disable Desktop Analytics collection**
|
||||
- Do not show feedback notifications: **Enabled**
|
||||
|
||||
#### File Explorer
|
||||
@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to **
|
||||
- Allow Cortana: **Disabled**
|
||||
- Don't search the web or display web results in Search: **Enabled**
|
||||
- Set what information is shared in Search: **Enabled**
|
||||
- Type of information: **Anonymous info**
|
||||
- Type of information: **Anonymous info**
|
||||
|
||||
#### Sync your settings
|
||||
|
||||
@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to **
|
||||
|
||||
- Do not send additional data: **Enabled**
|
||||
- Consent > Configure Default consent: **Enabled**
|
||||
- Consent level: **Always ask before sending data**
|
||||
- Consent level: **Always ask before sending data**
|
||||
|
@ -25,7 +25,7 @@ This section is a work in progress, because it takes considerably more time and
|
||||
|
||||
</div>
|
||||
|
||||
## Privacy Notes
|
||||
## Integritetsanmärkningar
|
||||
|
||||
Microsoft Windows, particularly those versions aimed at consumers like the **Home** version often don't prioritize privacy-friendly features by [default](https://theguardian.com/technology/2015/jul/31/windows-10-microsoft-faces-criticism-over-privacy-default-settings). As a result we often see more [data collection](https://en.wikipedia.org/wiki/Criticism_of_Microsoft#Telemetry_and_data_collection) than necessary, without any real warnings that this is the default behavior. In an attempt to compete with Google in the advertising space, [Cortana](https://en.wikipedia.org/wiki/Cortana_\(virtual_assistant\)) has included unique identifiers such as an "advertising ID" in order to correlate usage and assist advertisers in targeted advertising. At launch, telemetry could not be disabled in non-enterprise editions of Windows 10. It still cannot be disabled, but Microsoft added the ability to [reduce](https://extremetech.com/computing/243079-upcoming-windows-update-reduces-spying-microsoft-still-mum-data-collects) the data that is sent to them.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user