1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-16 16:01:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot 2025-03-03 00:46:55 +00:00
parent a9ae7ca9a5
commit ff1128f8b8
10 changed files with 40 additions and 40 deletions

View File

@ -3,7 +3,7 @@ title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
--- ---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause.
We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below.

View File

@ -161,7 +161,7 @@ To check the authenticity and safety of the model, look for:
- Community reviews and usage statistics - Community reviews and usage statistics
- A "Safe" badge next to the model file (Hugging Face only) - A "Safe" badge next to the model file (Hugging Face only)
- Matching checksums[^1] - Matching checksums[^1]
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded. - On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
A downloaded model is generally safe if it satisfies all the above checks. A downloaded model is generally safe if it satisfies all the above checks.

View File

@ -38,7 +38,7 @@ There are also many private alternatives to the apps that come pre-installed on
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android. When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require more permissive SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria: Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:

View File

@ -86,26 +86,26 @@ If you download APK files to install manually, you can verify their signature wi
3. Extract the downloaded archive: 3. Extract the downloaded archive:
```bash ```bash
unzip commandlinetools-*.zip unzip commandlinetools-*.zip
cd cmdline-tools cd cmdline-tools
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3" ./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
``` ```
4. Run the signature verification command: 4. Run the signature verification command:
```bash ```bash
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
``` ```
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. 5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
```bash ```bash
Signer #1 certificate DN: CN=GrapheneOS Signer #1 certificate DN: CN=GrapheneOS
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59 Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3 Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
``` ```
## F-Droid ## F-Droid

View File

@ -101,7 +101,7 @@ If you use iOS and are at high-risk, we have three additional suggestions for yo
2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be. 2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**. The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode). 3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).

View File

@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc
**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud.
[:octicons-home-16: Hemsida](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-home-16: Hemsida](https://onlyoffice.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Integritetspolicy" } :octicons-eye-16:{ .card-link title="Integritetspolicy" }
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Dokumentation} :octicons-info-16:{ .card-link title=Dokumentation}
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Källkod" } :octicons-code-16:{ .card-link title="Källkod" }
<details class="downloads" markdown> <details class="downloads" markdown>
<summary>Downloads</summary> <summary>Downloads</summary>

View File

@ -6,13 +6,13 @@ description: iOS is a mobile operating system developed by Apple for the iPhone.
**iOS** and **iPadOS** are proprietary mobile operating systems developed by Apple for their iPhone and iPad products, respectively. If you have an Apple mobile device, you can increase your privacy by disabling some built-in telemetry features, and hardening some privacy and security settings which are built in to the system. **iOS** and **iPadOS** are proprietary mobile operating systems developed by Apple for their iPhone and iPad products, respectively. If you have an Apple mobile device, you can increase your privacy by disabling some built-in telemetry features, and hardening some privacy and security settings which are built in to the system.
## Privacy Notes ## Integritetsanmärkningar
iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways.
We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services.
### Activation Lock ### Aktiveringslås
All iOS devices must be checked against Apple's Activation Lock servers when they are initially set up or reset, meaning an internet connection is **required** to use an iOS device. All iOS devices must be checked against Apple's Activation Lock servers when they are initially set up or reset, meaning an internet connection is **required** to use an iOS device.

View File

@ -1,18 +1,18 @@
--- ---
title: macOS Overview title: macOS Översikt
icon: material/apple-finder icon: material/apple-finder
description: macOS is Apple's desktop operating system that works with their hardware to provide strong security. description: macOS är Apples operativsystem för datorer som är integrerat med deras egen hårdvara för att ge ökad säkerhet.
--- ---
**macOS** är ett Unix-baserat operativsystem utvecklat av Apple för deras Macdatorer. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. **macOS** är ett Unix-baserat operativsystem utvecklat av Apple för deras Macdatorer. För att förbättra integriteten på macOS kan du inaktivera telemetrifunktioner och skärpa de befintliga integritets- och säkerhetsinställningar.
Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple Silicon](https://support.apple.com/HT211814). Äldre Intel-baserade Mac-datorer och Hackintosh-datorer stödjer inte alla säkerhetsfunktioner som macOS erbjuder. För att maximera datasäkerheten rekommenderar vi att du använder en nyare Macdator med [Apple Silicon.](https://support.apple.com/HT211814)
## Privacy Notes ## Integritetsanmärkningar
There are a few notable privacy concerns with macOS that you should consider. These pertain to the operating system itself, and not Apple's other apps and services. Det finns några anmärkningsvärda integritetsproblem med macOS som du bör tänka på. Dessa gäller själva operativsystemet och inte Apples övriga appar och tjänster.
### Activation Lock ### Aktiveringslås
Brand-new Apple Silicon devices can be set up without an internet connection. However, recovering or resetting your Mac will **require** an internet connection to Apple's servers to check against the Activation Lock database of lost or stolen devices. Brand-new Apple Silicon devices can be set up without an internet connection. However, recovering or resetting your Mac will **require** an internet connection to Apple's servers to check against the Activation Lock database of lost or stolen devices.

View File

@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th
#### Device Guard #### Device Guard
- Turn On Virtualization Based Security: **Enabled** - Turn On Virtualization Based Security: **Enabled**
- Platform Security Level: **Secure Boot and DMA Protection** - Platform Security Level: **Secure Boot and DMA Protection**
- Secure Launch Configuration: **Enabled** - Secure Launch Configuration: **Enabled**
#### Internet Communication Management #### Internet Communication Management
@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform
- Turn off AutoPlay: **Enabled** - Turn off AutoPlay: **Enabled**
- Disallow Autoplay for nonvolume devices: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled**
- Set the default behavior for AutoRun: **Enabled** - Set the default behavior for AutoRun: **Enabled**
- Default AutoRun Behavior: **Do not execute any AutoRun commands** - Default AutoRun Behavior: **Do not execute any AutoRun commands**
#### BitLocker Drive Encryption #### BitLocker Drive Encryption
You may wish to re-encrypt your operating system drive after changing these settings. You may wish to re-encrypt your operating system drive after changing these settings.
- Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled**
- Select the encryption method: **AES-256** - Select the encryption method: **AES-256**
Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows.
@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b
#### Data Collection and Preview Builds #### Data Collection and Preview Builds
- Allow Diagnostic Data: **Enabled** - Allow Diagnostic Data: **Enabled**
- Options: **Send required diagnostic data** (Pro Edition); or - Options: **Send required diagnostic data** (Pro Edition); or
- Options: **Diagnostic data off** (Enterprise or Education Edition) - Options: **Diagnostic data off** (Enterprise or Education Edition)
- Limit Diagnostic Log Collection: **Enabled** - Limit Diagnostic Log Collection: **Enabled**
- Limit Dump Collection: **Enabled** - Limit Dump Collection: **Enabled**
- Limit optional diagnostic data for Desktop Analytics: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled**
- Options: **Disable Desktop Analytics collection** - Options: **Disable Desktop Analytics collection**
- Do not show feedback notifications: **Enabled** - Do not show feedback notifications: **Enabled**
#### File Explorer #### File Explorer
@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to **
- Allow Cortana: **Disabled** - Allow Cortana: **Disabled**
- Don't search the web or display web results in Search: **Enabled** - Don't search the web or display web results in Search: **Enabled**
- Set what information is shared in Search: **Enabled** - Set what information is shared in Search: **Enabled**
- Type of information: **Anonymous info** - Type of information: **Anonymous info**
#### Sync your settings #### Sync your settings
@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to **
- Do not send additional data: **Enabled** - Do not send additional data: **Enabled**
- Consent > Configure Default consent: **Enabled** - Consent > Configure Default consent: **Enabled**
- Consent level: **Always ask before sending data** - Consent level: **Always ask before sending data**

View File

@ -25,7 +25,7 @@ This section is a work in progress, because it takes considerably more time and
</div> </div>
## Privacy Notes ## Integritetsanmärkningar
Microsoft Windows, particularly those versions aimed at consumers like the **Home** version often don't prioritize privacy-friendly features by [default](https://theguardian.com/technology/2015/jul/31/windows-10-microsoft-faces-criticism-over-privacy-default-settings). As a result we often see more [data collection](https://en.wikipedia.org/wiki/Criticism_of_Microsoft#Telemetry_and_data_collection) than necessary, without any real warnings that this is the default behavior. In an attempt to compete with Google in the advertising space, [Cortana](https://en.wikipedia.org/wiki/Cortana_\(virtual_assistant\)) has included unique identifiers such as an "advertising ID" in order to correlate usage and assist advertisers in targeted advertising. At launch, telemetry could not be disabled in non-enterprise editions of Windows 10. It still cannot be disabled, but Microsoft added the ability to [reduce](https://extremetech.com/computing/243079-upcoming-windows-update-reduces-spying-microsoft-still-mum-data-collects) the data that is sent to them. Microsoft Windows, particularly those versions aimed at consumers like the **Home** version often don't prioritize privacy-friendly features by [default](https://theguardian.com/technology/2015/jul/31/windows-10-microsoft-faces-criticism-over-privacy-default-settings). As a result we often see more [data collection](https://en.wikipedia.org/wiki/Criticism_of_Microsoft#Telemetry_and_data_collection) than necessary, without any real warnings that this is the default behavior. In an attempt to compete with Google in the advertising space, [Cortana](https://en.wikipedia.org/wiki/Cortana_\(virtual_assistant\)) has included unique identifiers such as an "advertising ID" in order to correlate usage and assist advertisers in targeted advertising. At launch, telemetry could not be disabled in non-enterprise editions of Windows 10. It still cannot be disabled, but Microsoft added the ability to [reduce](https://extremetech.com/computing/243079-upcoming-windows-update-reduces-spying-microsoft-still-mum-data-collects) the data that is sent to them.