[tor-commits] [tor-glossary/master] add Spanish and German glossaries

emmapeel at torproject.org emmapeel at torproject.org
Wed Nov 14 13:43:15 UTC 2018


commit 2399088ab4efbe4b933bd0d00df0062ca7b97e45
Author: emma peel <emma.peel at riseup.net>
Date:   Wed Nov 14 11:33:05 2018 +0000

    add Spanish and German glossaries
---
 glossary_de.csv | 2182 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 glossary_es.csv | 2186 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 4368 insertions(+)

diff --git a/glossary_de.csv b/glossary_de.csv
new file mode 100644
index 0000000..3227bfa
--- /dev/null
+++ b/glossary_de.csv
@@ -0,0 +1,2182 @@
+term,pos,comment,de
+ donation process,,,
+ testing,,,
+ third-party,,,
+!,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",!
+"""",Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",»«
+$,,,
+%s,Conjunction,Do not translate or change. This is a placeholder (ex: 2%s or 1%s),»%s«
+ ,Conjunction,"&_nbsp_; [without underscores, Non-Breaking Space]","[Bitte ganz weglassen. Entspricht in HTML einem geschützen Leerzeichen, das aber - wenn überhaupt - an dieser Position zumeist nur im englischen Original Sinn macht]"
+...,,,
+24/7,Noun,"Twenty-four hours, seven days a week. This essentially means ""all the time"" (non stop). Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running.",rund um die Uhr
+2FA,Noun,"Two-factor authentication
+Two-factor authentication
+""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",
+3D bar chart,Noun,[Martus],3D Balkendiagramm
+3rd party,Adjective,[Signal] As in “Use a 3rd party application.”,
+:,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",:
+;,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",;
+?,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",?
+A reasonably secure operating system,Noun,[Qubes OS] This is the Qubes OS tagline.,Ein vertretbar sicheres Betriebssystem
+A security-oriented operating system,Noun,[Qubes OS],Ein sicherheitsorientiertes Betriebssystem
+ADIDS,Noun,what is that?,
+API,Noun,"Application Programming Interface: ""In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software."" - Wikipedia",API
+APK,Noun,"""Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10."" https://en.wikipedia.org/wiki/Android_application_package",APK
+About,Noun,,
+Alice,,[Briar],
+American Apparel,,,
+Android,Noun,[Signal] [Orbot] Operating system,Android
+Anti Evil Maid,Noun,[Qubes OS] Do not translate. Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. (Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html),
+App Store,Noun,Apple App Store [Signal],App Store
+AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended for running software applications.",
+Apt.,,,
+Ativistas,,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],
+Autonomous System number,Noun,,
+BCC,Noun,"""Blind carbon copy""",BCC
+Back,Adverb,,
+Back to,,,
+Backup Key File,Noun,[Martus] Also: key backup,Sicherungsschlüsseldatei
+Benetech,Noun,Company name which should not be translated or transcribed.,
+BitTorrent,,,
+Bitcoin,,,
+Blow the Whistle,Noun,[Globaleaks],
+Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,Hinweise geben
+Bob,,[Briar],
+Bug,,,
+C&C,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",
+C2,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",
+CFC program,,,
+CIDR,Noun,Classless inter-domain routing,
+CPU,Noun,,
+CSR,Noun,Certificate Signing Request,
+CSRF,Noun,,
+CVC,,,
+Cancel,Verb,,
+Card Number,,,
+Carol,,[Briar],
+Certificate Signing Request,Noun,,
+ChatSecure,Noun,Application Name,
+Chrome App,Noun,[Signal],
+Chrome OS,Noun,,
+Chrome Web Store,Noun,,
+Circuit Display,Noun,[Tor],
+Clear,Noun,,
+Clearnet,Noun,,Sichtbare Internet
+Client User Interface,Noun,,Client-Benutzeroberfläche
+ClockVM,Noun,,
+Combined Federal Campaign,,,
+Command-line tool,Noun,"The ""command line"" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar ""icons and buttons"" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the resp
 onses don't match your expectations.
+Source EFF.",Befehlszeilenwerkzeug
+Comments,,,
+Commit,Noun,,
+Commit,Verb,,
+Company,,,
+Contributions,,,
+Contributors,Noun,,
+Core,,,
+Courier,Noun,"App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (كوريور)",
+"Credit Card, credit card",,,
+Cross-site scripting,Noun,,
+Crowdfunding,,,
+Crypto,Adjective,,
+Crypto,Noun,This is an abbreviation of “cryptography.”,
+Customization Template Files (*.mct),Noun,[Martus],
+DD,Noun,,
+DDoS,Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
+Synonyms: distributed denial of service
+Source EFF",
+DDoS (distributed denial of service),Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)",
+DHT,Noun,,
+DNS,Noun,[Orbot],DNS
+DNS record,Noun,,
+DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates.",
+DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,
+Darknet,Noun,,
+Data Retention Strategy,Noun,,
+Data Source Grid,Noun,,
+Data-Driven Dropdown (Field),Noun,[Matus],
+Date,Noun,,
+Debian-based Linux,Noun,[Signal],
+Deflect,Noun,Don't translate this,
+Desktop Client,Noun,,
+Device Management,Noun,,
+Devtools,Noun,,
+Disconnect ,,Disconnect search service,
+DispVM,Noun,"[QubesOS] ""Disposable Virtual Machine""A temporary AppVM based on a DVM Template which can quickly be created, used, and destroyed.",
+Distributed,Verb,,
+Distribution,Noun,,
+Divice Management,Noun,,
+Dom0,Noun,"[QubesOS] ""Domain Zero"" Also known as the **host** domain, dom0 is the initial VM started by the Xen hypervisor on boot.",
+DomU,Noun,"[QubesOS] ""Unprivileged Domain""Also known as **guest** domains, domUs are the counterparts to dom0.",
+Donate,,,
+Donate Page,,,
+Donor (n),Noun,,
+Double-check,Verb,[Signal],
+Download,Verb,,
+Downloading,,,
+Downloads,Noun,,
+Drag and Drop,Noun,,Ziehen und Ablegen
+Drawer,Noun,"A UI design pattern that consist on a lateral, hidden menu that can be brought into view usually by tapping an ""hamburguer"" icon or swiping from the left.",
+DuckDuckGo,Noun,Name of an open source search engine.,
+Dump,Noun,,
+Dump,Verb,,
+EPUB Reader,Noun,,ePub-Leser
+Eavesdropping,Noun,,
+Edge,Noun,,
+Edge server,Noun,,
+Email Subject,Noun,[Globaleaks],E-Mail Betreff
+Encrypted,Verb,[Globaleaks],verschlüsselt
+Ensure,Verb,,
+Enter,,,
+Event,Noun,,
+External drive,Noun,,
+Extra text,Noun,,
+FAI satellite,Noun,,
+FAQ,Noun,[Orbot] “Frequently Asked Questions”,F&A
+FOSS,Noun,Free and open-source software,
+FTP (File Transfer Protocol),Noun,"An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
+Synonyms: FTP server, File Transfer Protocol. (Source: EFF)",
+FTP server,Noun,"An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer Protocol) (Source EFF)",
+Face ID,Noun,[Signal] Specific to iOS,
+Fallback,Adjective,[Globaleaks],
+Fallback,Noun,[Orbot] [Globaleaks],Rückfall / Rückfallmodus
+Favicon,Noun,"A favicon, also known as a shortcut icon, website icon, tab icon, URL icon, or bookmark icon, is a file containing one or more small icons, associated with a particular website or web page.",
+Feedback,Noun,,
+File fingerprint,Noun,"A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
+Synonyms: file hash value.
+Source EFF.",
+File hash value,Noun,"A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
+Synonyms: File fingerprint.
+Source EFF.",
+File system,Noun,"Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.
+Source EFF.",
+Firefox,Noun,,
+Firewall,Noun,"A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways. (Source: EFF)",Firewall
+FirewallVM,Noun,"[Qubes] ""Firewall Virtual Machine""A type of ProxyVM which is used to enforce network-level policies (a.k.a. ""firewall rules"").",
+Firewalled,Adjective,,
+Firmware,Noun,,
+Fit,,,
+Folder Options,Noun,,Ordneroptionen
+Form,Noun,,Eingabemaske
+Form 990,,,
+Forward Secrecy,Noun,"A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For  messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
+Synonyms: Perfect forward secrecy.
+Source EFF.",
+Frequently Asked Questions,Noun,“FAQ”,
+Full disk encryption,Noun,"If you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.
+Source EFF.",
+Fully Qualified Domain Name,Noun,See https://en.wikipedia.org/wiki/Fully_qualified_domain_name,
+Functionality,Noun,,
+GC,Noun,Garbage collector,
+GDPR,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",
+GFW,Noun,,
+GIF,Noun,Graphics Interchange Format [Signal],
+GNU General Public License,Noun,,
+GPG,Noun,"""Gnu Privacy Guard"" GPG is a free software that implements OpenPGP specification",
+Garbage data,Noun,,
+Garlic,Noun,https://en.wikipedia.org/wiki/Garlic_routing,
+Garlic routing,Noun,https://en.wikipedia.org/wiki/Garlic_routing,
+General Data Protection Regulation,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",
+Get,,,
+Get Access Mode,Noun,[Lantern],Zugang-erhalten-Modus
+GetTor,Noun,[Orbot] [Tor],
+Getting Started,Noun,,
+Ghost,Noun,"[Peerio] ""Ghost"" is used as a proper noun in Peerio for a feature that allows users to send messages and files to a non-Peerio user via email or URL. This URL can be accessed with a secret passphrase and decrypted in the browser.
+
+""I sent you a (Peerio) Ghost""",
+Giant Rabbit,,,
+Give Access Mode,Noun,[Lantern],Zugang-geben-Modus
+GlobaLeaks,Noun,[Globaleaks] Name of application. Do not translate.,
+Glossary,Noun,,
+Go Back,Verb,,
+Google,Verb,Company Name (Reference Google.com for appropriate transcription if applicable),
+Google Captcha,Noun,,
+Google Chrome,Noun,,
+Google Drive,Noun,,
+Google Play Store,Noun,[Signal],
+Got Skills,,,
+Graceful Shutdown,Noun,[I2P],
+Gracefully,Adverb,,
+Graph,Noun,,
+Graph,Verb,,
+Great Firewall of China,Noun,,
+Grid,Noun,,
+Guardian Project,Noun,,
+HQ,Noun,,
+HRD,Noun,Human Rights Defence,
+HTTP,Noun,"[Orbot] ""The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web."" - Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol)",
+HTTP Header Field Manipulation,Noun,,
+HTTP Invalid Request Line,Noun,,
+HTTPS,Noun,"""HTTPS (also called HTTP over Transport Layer Security [TLS], HTTP over SSL, and HTTP Secure) is a communications protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data."" - Wikipedia (https://en.wikipedia.org/wiki/HTTPS)",
+HTTPS Everywhere,Noun,,HTTPS Everywhere
+HTTPS certificate,Noun,,HTTPS-Zertifikat
+HVM,Noun,"[Qubes] ""Hardware Virtual Machine""Any fully virtualized, or hardware-assisted, VM utilizing the virtualization extensions of the host CPU.",
+Hardcoded,Verb,,
+Hardware,Noun,,Hardware
+Headline,Noun,,
+Heart of Internet Freedom,,,
+Heart of Internet Freedom T-Shirt,,,
+Heartbeat,Noun,,
+Help,Noun,[Orbot],
+Hidden,Adjective,,
+Hidden Service,Noun,[Orbot],Versteckter Dienst
+Homepage,Noun,[Globaleaks],Homepage
+Hop,Noun,,
+Hosting provider,Noun,,
+Hotspot,Noun,,
+Housekeeping,Noun,,
+I/O,Noun,Input/ouput,
+I2P,Noun,[I2P] Name of application. Do not translate.,I2P
+ID,Noun,[Mailvelope],ID
+IDE,Noun,,
+IMAP settings,Noun,"IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.
+Source EFF.",
+IP address,Noun,"[Orbot] A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. (Source EFF)",IP-Adresse
+IP addresses,Noun,,
+ISP (Internet Service Provider),Noun,ISP,Internetdienstanbieter
+Immediate,Adjective,,
+Implement,Verb,,
+Inbound,Adjective,,
+Include Private Data,Verb,,
+Indicators of compromise,Noun,"Clues that show that your device may have been broken into or tampered with.
+Source EFF.",
+Intermediate Certificate,Noun,,
+Internal storage,Noun,"Non volatile memory used in devices, mobile or else.",
+Internet,Noun,[Signal],Internet
+Internet filtering,Noun,Filtering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF),
+Introduce,Verb,,
+Introducer,Noun,,
+Introduction,Noun,,
+Invalid,,,
+Item,Noun,,
+JRE,Noun,Synonym: Java Runtime Environment,
+JS,Noun,,
+Java Runtime Environment,Noun,Synonyme : JRE,
+Javascript,,,
+Javascript,Noun,,
+Join,Verb,,
+Journalists,,,
+KB,Noun,[Orbot] kilobyte,
+KB/s,Noun,,
+"KB/s, Kbps",Noun,,
+KBps,Noun,,
+"Kbps, KB/s",Noun,[Orbot] kilobytes per second,
+Key Backup,Noun,[Martus],Schlüsselsicherung
+Key Exchange,Noun,,
+Key fingerprint,Noun,"A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.
+Source EFF.",
+Key verification,Noun,"In public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.
+Source EFF.",
+Key-signing party,Noun,"When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others ""I believe this key belongs to this person -- and if you trust me, you should believe that too."" Telling the world that you trust someone's key is called ""signing their key"": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to other friends.
+Synonyms: cryptoparty.
+Source EFF.",
+Keyboard,Noun,[Signal],Tastatur
+Keyboard Layout,Noun,,Tastaturbelegung
+Keylogger,Noun,"A malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The ""key"" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.
+Source EFF.",
+Language pack,Noun,,Sprachpaket
+Lantern,Noun,[Lantern] Application Name (https://getlantern.org),
+Lantern Cloud Server,Noun,[Lantern] “Lantern” is the name of an application. (https://getlantern.org),Lantern-Cloud-Server
+Last Name,,,
+Launcher,Noun,,Starter
+Leak,Noun,Synonym: data leakage,Leck
+Lease,Noun,,
+Leaseset,Noun,,
+Let's Encrypt,Noun,Don't translate this. For more info see https://en.wikipedia.org/wiki/Let%27s_Encrypt,
+License Agreement,Noun,[Globaleaks],
+Linked Identity,Noun,,
+List,Noun,,
+Listen,Verb,,
+Live CD,Noun,,
+Live ISO,Noun,,
+Live OS,Noun,,
+Live System,Noun,,
+Live USB,Noun,,
+Login page,Noun,,
+MB,Noun,[Orbot] megabyte,
+MBR,Noun,,
+MIME,Noun,[Signal],
+MISP (Malware Information Sharing Platform),Noun,"[SES] ""The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.
+A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information."" -http://www.misp-project.org/",
+MITM,Noun,"Suppose you believe you were speaking to your friend, Bahram, via encrypted  messenger. To check it's really him, you ask him to tell you the city where you first met. ""Istanbul"" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to de
 fend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
+Synonyms: Man-in-the-middle attack.
+Source EFF.",
+MM,Noun,,
+MMS,Noun,“Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service [Signal],
+MMSC,Noun,Multimedia Messaging Service Center. A mobile network operator's store and forward server for relaying MMS (Multimedia Messaging Service) messages. [Signal],
+Magic Word,Noun,,Magisches Wort
+Mail routes,Noun,,
+Maintainer,Noun,,Hauptbetreuer
+Malformed,Adjective,,
+Malicious,Adjective,,
+Malicious software,Noun,"Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
+Synonyms: Malware.
+Source EFF.",
+Malware,Noun,"Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
+Synonyms: Malicious software
+Source EFF.",Schadprogramm
+Man-in-the-middle attack,Noun,"Suppose you believe you were speaking to your friend, Bahram, via encrypted  messenger. To check it's really him, you ask him to tell you the city where you first met. ""Istanbul"" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications 
 software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
+Synonyms: MITM
+Source EFF.",
+Manage Contacts,Noun,[Martus] Martus menu option.,Kontakte verwalten
+Martus Desktop,Noun,[Martus],
+Martus Desktop Application,Noun,[Martus],
+Martus Information Management and Data Collection Framework,Noun,[Martus],
+Martus Record Archive (*mba),Noun,[Martus],Martus-Datensatzarchiv (*mba)
+Martus Report Format (.mrf),Noun,[Martus],Martus-Berichtsformat (.mrf)
+Martus Search Specification,Noun,[Martus],
+"Master Boot Record, MBR",Noun,,
+Master password,Noun,"A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.
+Source EFF.",
+Match,,,
+Matching,Adjective,[Globaleaks],übereinstimmen
+Matching Conditions,,,
+Megabytes,Noun,[Globaleaks],
+Message Format,Noun,,
+Message Of The Day,Noun,,
+Mixnet,Noun,,
+Mobile Martus,Noun,[Martus],
+Multihome,Noun,,
+Multihoming,Noun,,
+My Computer,Noun,The user’s home folder in some operating systems.,Mein Rechner
+NAT,Noun,Network Address Translation,
+NGO,Noun,Non-Governmental Organization,
+NGOs,,,
+NSA,,,
+Name,Noun,,
+Naming service,Noun,,
+Navegador Tor,Noun,,
+NetDB,Noun,network database,
+NetVM,Noun,"""Network Virtual Machine""A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM.",
+Network database,Noun,,
+Network drive,Noun,,
+New,Adjective,,Neue
+Newsletter,Noun,,Infobrief
+Next,Noun,“Next” button,
+No,Noun,,
+Node,Noun,,Knotenpunkt
+Non-Tor,Noun,,
+Notes,,,
+OK,Noun,[Signal] “OK” button which can also be translated as “Accept”,
+OPML,Noun,"Outline Processor Markup Language
+
+""OPML (Outline Processor Markup Language) is an XML format for outlines (defined as ""a tree, where each node contains a set of named attributes with string values""). Originally developed by UserLand as a native file format for the outliner application in its Radio UserLand product, it has since been adopted for other uses, the most common being to exchange lists of web feeds between web feed aggregators.""
+- https://en.wikipedia.org/wiki/Opml",
+OS,Noun,Operating system,
+OTR,Noun,Off The Record,OTR
+Observatory,Noun,,Beobachtungsstelle
+Off,Adjective,,Aus
+Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for  messaging conversations. (Synonyms : OTR) (Source EFF)",
+Oil pipeline,Noun,,
+On,Adjective,,
+One-time password,Noun,"Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
+Source EFF.",
+Onion,Noun,[Tor],
+Onion Address,Noun,[Tor],
+Onion Browser,Noun,[Tor],
+Onion Circuits,Noun,[Tor],
+Onion routing,Noun,[Tor],
+Open Observatory of Network Interference,,,
+Open Observatory of Network Interference (OONI) ,,,
+Open Observvatory of Network Interference (OONI),,,
+Open Source,,,
+Open Whisper Systems,Noun,Organization name. Do not translate. [Signal],
+Open-source software,Noun,"Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software,"" it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.
+Synonyms: FLOSS, free, libre and open-source software, free software
+Source EFF.",
+OpenPGP,Noun,OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy),
+OpenPGP key,Noun,,OpenPGP Schlüssel
+Operating System (OS),Noun,"A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems. (Source: EFF)(Synonym: OS) [Signal]",
+Optional Setup,Noun,,
+Orbot,Noun,[Orbot] Name of application. Do not translate.,
+Oudated,Adjective,,
+Out-of-band verification,Noun,"""Out-of-band"" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.
+Synonyms: out-of-band
+Source EFF.",
+Outdated,Adjective,,
+Overhead,Noun,,
+Overlay network,Noun,,
+Overview,Noun,[Globaleaks],Überblick
+P.O. Box,Noun,,
+PDF,Noun,,
+PGP,Noun,"""Pretty Good Privacy"" PGP is a commercial software for cyphering",
+PIN,Noun,Personal Identification Number [Signal],
+PV,Noun,"[QubesOS] ""Paravirtualization""An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.",
+PVHVM,Noun,"[QubesOS] ""Paravirtualization on Hardware Virtual Machine""To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers).",
+Padding,Noun,,
+Page Report,Noun,Type of report generated by Martus - not one page of a report.,Seitenbericht
+Pane,Noun,,
+Panic,Noun,"Panic button, panic app",
+Passive adversary,Noun,"A passive adversary is one that can listen to your communications, but cannot directly tamper with them.
+Source EFF.",
+Passphrase,Noun,,
+Password manager,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
+Synonyms: Secure password database; password safe.
+Source EFF.",
+Password safe,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
+Synonyms: Secure password database, Password manager.
+Source EFF.",
+Passwords field,Noun,,
+Passwords field ,Noun,,
+Peer-to-Peer (P2P),Adjective,,Rechner-Rechner-Verbindung
+Perfect forward secrecy,Noun,"A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For  messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
+Synonyms: Forward secrecy.
+Source EFF.",
+Permalink,Noun,,
+Persistence wizard,Noun,,Permanentassistent
+Persistent Storage,Noun,,
+Personal information,Noun,,
+Photo story,Noun,,
+Phrases,Noun,,
+Pie Chart,Noun,[Martus],
+Piece,Noun,,
+Plaintext,Noun,[Globaleaks] [Signal],Klartext
+Plan,Noun,,
+Plans,Noun,,
+Platform,Noun,[Globaleaks],Plattform
+Please,Adverb,,
+Pledge,,,
+Pluggable Transport,Noun,,austauschbare Übertragungsart
+Pluggable Transports Bundle,Noun,,
+Policy,Verb,,
+Pool,Noun,,
+Post,Noun,,
+Post,Verb,,
+Post-traumatic stress,Noun,,
+Posted,Verb,,
+Power Off,Verb,,Ausschalten
+Powering,,,
+Powering Digital Resistance,,,
+Powering Digital Resisteance,,,
+Preparation,Noun,,
+Pretty Good Privacy,Noun,"PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
+PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. (Synonyms: PGP) (Source: EFF)",
+Primary,Noun,,
+Procedure,,,
+Proceed,Verb,,
+Projects,Noun,,
+Promote,,,
+Protect,,,
+Protocol,Noun,"A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called ""http"". Some protocols use encryption to protect their contents. The secure version of the http protocol is called ""https"". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging.
+Source EFF.",
+Province,Adjective,,
+Province,Noun,,"Status, Zustand, Staat"
+ProxyVM,Noun,"[QubesOS] ""Proxy Virtual Machine""A type of VM which proxies network access for other VMs",
+Pseudonym,Noun,"A name that you choose to use in some context (like an online forum) and that others may come to recognize, but that isn’t connected to names that people know you by in your day-to-day life.
+Source EFF.",
+PsiCash,Noun,[Psiphon],
+Psiphon,Noun,"Name of an organization and application. Please do not translate this term. If needed, you can transcribe the organization / tool name. For example, the name is transcribed in Arabic, Persian and Amharic.",
+Public Information File (*.mpi),Noun,[Martus] Files containing the account's public information,Öffentliche Informationsdateien (*.mpi)
+Public key cryptography,Noun,,
+Public key encryption,Noun,"Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password ""bluetonicmonster"", you would need both the file and the secret ""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the ""public key"": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Asymmetric key encryption, Public key cryptography.
+Source EFF.",
+Public key servers,Noun,"If you plan to send a secure message to someone who uses public key cryptography like PGP, you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such keys, allowing software to use an email address, name, or key fingerprint to search for a full key and download it. There are many PGP public key servers, but they usually share their key collections with each other. Keyservers can't verify whether the keys they publish are genuine or forgeries. Anyone can upload a key to a public key server—in anyone's name. That means that a key connected to a person's name or email on a keyserver might not be their real key. In order to check the authenticity of a key, you need to check its signatures, or confirm its fingerprint with the original user in a trustworthy way.
+
+PGP allows you to sign other people's keys, which is a way of using your own key to assert that a certain key is the right one to use to contact another person. This is meant to provide a way of distinguishing between genuine and fake keys; if people sign the right keys for people they know and communicate with, others can use those signatures to confirm that the genuine keys are genuine. When you download a key from a key server, it may include signatures from other people who affirm that it's the right one. If you know those people and know that you have the right key for them, you can have more confidence in the newly downloaded key. This verification process is also called the web of trust. Its advantage is that it's decentralized and not controlled by any authority, so you don't have to believe a certain company or government about which keys to use when writing to new people. Instead, you can believe your own social networks. One important disadvantage of the web of trust is t
 hat publishing signatures for other people's keys tells the whole world who your contacts are; it creates public evidence that you know particular people. Also, using the web of trust correctly requires a good deal of time and attention, and some communities rarely or never participate. (Source: EFF)",
+Q&A,Noun,,F&A
+QR Code,,,
+QR code,Noun,[Signal] [Orbot],
+"QR code, code",Noun,[Signal],QR-Code
+Qubes Global Settings,Noun,[QubesOS],
+Qubes OS,Noun,"[QubesOS] Do not translate ""Qubes OS""",
+Query,Noun,,
+Questionnaire,,,
+RAM,Noun,,
+RMI,Noun,,
+ROM,Noun,[Signal],
+Randomization,Noun,,
+Rate,Noun,,
+Read,Verb,,
+ReadMe,Noun,The ReadMe file included with any new software release that describes changes to software,Liesmich (Datei)
+Reboot,Noun,,neu starten
+Reboot,Verb,,
+Record ID,Noun,,Datensatzkennung
+Reference Guide,Noun,,
+Referer,Noun,,Referer / Absender
+Referer spoofing,Noun,,Absender / Referer-Manipulation
+Refresh,Noun,,
+Refresh,Verb,,
+Registration Lock,Noun,[Signal],
+Reject,Verb,,
+Release key,Noun,,
+Removable media,Noun,,
+Removable media drive,Noun,,
+Repliable datagram,Noun,,
+Required,Adjective,,
+Reseed,Verb,,
+Retry,Verb,,
+Retweet,Noun,,
+Retweet,Verb,,
+Reusable Choice,Noun,,
+Revocation certificate,Noun,"What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.
+Source EFF.",
+Reward,Noun,,
+Rich Text,Noun,,
+Ring Tone,Noun,,
+Rip,Noun,,
+Risk analysis,Noun,"In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
+Synonyms: Risk, Risk Assessment.
+Source EFF.",
+Risk assessment,Noun,"In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
+Synonyms: Risk, Risk analysis.
+Source EFF.",
+Roadmap,Noun,,
+Role-based access control,Noun,[Globaleaks],
+Root,Noun,,
+RouterInfo,Noun,,
+Ruleset Tests,Noun,,Regelsatztests
+Running environment,Noun,,
+Runtime,Noun,,
+SD card,Noun,,
+SES (Suspicious Email Submitter),Noun,[SES] Project Name. Please do not translate.,
+SIM card,Noun,"A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.
+Source EFF.",
+SMS,Noun,"“SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.[1] It uses standardized communication protocols to enable mobile devices to exchange short text messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal]",
+SMTP,Noun,[Globaleaks],
+SOCKS,Noun,"[Orbot] ""Socket Secure (SOCKS) is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded."" - Wikipedia (https://en.wikipedia.org/wiki/SOCKS)",
+SSD (Solid-State Drive),Noun,"""A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently."" -https://en.wikipedia.org/wiki/Solid-state_drive
+
+""Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.""
+Source EFF",
+SSH,Noun,"""Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users."" - Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell)",
+SSL,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as ""SSL"", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers."" - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security)",
+SSL Observatory,Noun,,SSL-Beobachtungsstelle
+SVM,Noun,Support Vector Machine,
+SVM (Support Vector Machine),Noun,"""In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis."" - https://en.wikipedia.org/wiki/Support_vector_machine",
+Safe-house,Noun,,
+Satellite Provider,Noun,,
+Screen Lock,Noun,[Signal],
+Search,Noun,,
+Search Engine,Noun,,Suchmaschiene
+Search Results,Noun,Application menu item.,Suchergebnisse
+Secure Sockets Layer,Noun,,
+Secure Sockets Layer (SSL),Noun,"The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL). (Synonyms: Transport layer security) (Source: EFF)",
+Secure password database,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them. (Synonyms: Password manager, password safe) (Source EFF)",
+Security certificate,Noun,"A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
+(Synonyms: Digital certificate) (Source EFF)",
+Security question,Noun,"To supplement passwords, some systems use ""security questions."" These are queries to which only you are supposed to know the answer. The problem with security questions is that they are really just extra passwords that have potentially guessable or discoverable answers. We recommend you treat them as any other password: create a long, novel, random, phrase to answer them, and record that somewhere safe. So the next time your bank asks you your mother's maiden name, you should be ready to answer ""Correct Battery Horse Staple"" or similar.(Source EFF)",
+Security token,Noun,,
+Seed,Noun,,
+Seeding,Noun,,
+Select,,,
+Select Fit,,,
+Sensitive,Adjective,,
+Sensor,,,
+Server,,,
+Servers,Verb,,
+ServiceVM,Noun,"""Service Virtual Machine""A VM the primary purpose of which is to provide a service or services to other VMs.",
+Setting,Noun,,Einstellungen
+Settings,Noun,[Signal] [Orbot] Application menu item.,
+Short User Manual,Noun,,
+Signal,Noun,[Signal] Name of application. Do not translate.,
+Size,,,
+Slim,,,
+Socket,Noun,,
+Software,Noun,,
+Solid State Drive,Noun,"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.
+Synonyms: SSD.
+Source EFF.",
+Source code,Noun,,
+Speed Boost,Noun,[Psiphon],
+Standalone(VM),Noun,"[QubesOS] ""Standalone (Virtual Machine)""In general terms, a VM is described as **standalone** if and only if it does not depend on any other VM for its root filesystem.",
+StandaloneHVM,Noun,"[QubesOS] ""Standalone Hardware Virtual Machine""Any HVM which is standalone (i.e., does not depend on any other VM for its root filesystem).",
+Standard Fields,Noun,,Standardfelder
+Sticker Pack,,,
+Stock,,,
+Stocks,,,
+Street Address,,,
+Subtitle,Noun,[Globaleaks],Untertitel
+Summary,Noun,,
+Support,,,
+Support Vector Machine,Noun,,
+Sure,,,
+Surname,Noun,,
+Sweatshirt,,,
+Sync Manager,Noun,,
+Sys admin,Noun,,
+System administrator,Noun,,
+TLS,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as ""SSL"", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers."" - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security)",
+TOFU,Noun,"Trust on first use:
+https://en.wikipedia.org/wiki/Trust_on_first_use",
+TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",
+TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",
+TTL,Noun,,
+Tails,Noun,Name of the organization and tool.,Tails
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,
+Take a stand,,,
+Tamanho,,,
+TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual Machine""Any HVM that depends on a TemplateVM for its root filesystem.",
+TemplateBasedVM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which depends on a TemplateVM for its root filesystem.",
+TemplateHVM,Noun,"[QubesOS] ""Template Hardware Virtual Machine""Any HVM which functions as a TemplateVM by supplying [QubesOS] its root filesystem to other VMs.",
+TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies its root filesystem to another VM.",
+Terms & Privacy Policy,Noun,[Signal],
+Text message,Noun,Synonym: SMS,
+Thanks You,,,
+Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",
+Threat model,Verb,,
+Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat model) (Source EFF)",
+Throwaway,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",
+Throwaway address,Noun,"An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
+Source EFF.",
+Timestamp,Noun,,
+To date though,,,
+Toolkit,Noun,,
+Tools,Noun,[Martus] Martus menu option.,Werkzeuge
+Tor,Noun,[Orbot],
+Tor Blog,,,
+Tor Blog,Noun,,
+Tor Bridges,Noun,,
+Tor Browser,,,
+Tor Browser,Noun,"[Orbot] Application Name (https://www.torproject.org/projects/torbrowser.html.en). You can translate the word ""Browser"", however ensure that it is translated consistently across all resources and projects.",Tor Browser
+Tor Browser Bundle,Noun,,
+Tor Browser profile directory,Noun,,
+Tor News,,,
+Tor News,Noun,,
+Tor Project,,,
+Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be transcribed dependent on language.,
+Tor bridge,Noun,,Tor-Brücke
+Tor messenger,Noun,[The Tor Project],
+Tor network,Noun,,Tor-Netzwerk
+Tor relay,Noun,[Tor] [Orbot],Tor-Relais
+Torbutton,Noun,,
+Touch ID,Noun,[Signal] Specific to iOS,
+Trademark,Noun,,
+Twitter,,,
+Two-Factor,Noun,,
+UI,Noun,user interface,
+URL,Noun,,URL
+US $,,,
+USB drive,Noun,Specifically thumbdrives used as external storage.,USB-Speicherstick
+USB stick,Noun,,
+UpdateVM,Noun,[QubesOS],
+Uploaded,Adjective,[Globaleaks],hochgeladen
+UsbVM,Noun,[QubesOS],
+Usually,,,
+VM,Noun,"""virtual machine""",
+VPN,,,
+VPN,Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
+Synonyms: Virtual Private Network
+Source: EFF",
+VPNs,,,
+Vanilla Bridges,,,
+Vidalia,Noun,,
+Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",
+Virtual Private Network (VPN),Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF)",
+"Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",
+Virtual Private Server (VPS),Noun,Virtual Private Server,
+VoIP Call,Noun,,
+Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
+Synonyms: VoIP.
+Source EFF.",
+WAN,Noun,,
+Warning!,Interjection,ex: “Warning! Selecting 'OK' will permanently delete all files”,Achtung
+Web-based proxy,Noun,"A website that lets its users access other, blocked or censored websites. Generally, the web proxy will let you type a web address (or URL) onto a web page, and then redisplay that web address on the proxy page. Easier to use than most other censorship-circumventing services.
+Source EFF.",
+WebApp,Noun,,
+Welcome,Noun,,
+WhisperBack,Noun,,
+WiFi,Noun,,
+Windows,Noun,Operating system,Windows
+Work,Verb,,
+World Wide Web,Noun,,
+XMPP,Noun,"Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. [Signal]",
+XSS,Noun,,
+XXL,,,
+YYYY,Noun,“Year” Indicates that user must input a 4-digit year (ex: 1990),
+Zip,,,
+about,Preposition,"[Globaleaks] As in, the “About” section of a website or application.",Über
+academic,,,
+accept,Verb,[Signal],annehmen
+access,Noun,,Zugang
+access,Verb,,zugriff
+access mode,Noun,,Zugangsmodus
+access token,Noun,"[Martus]
+Short identification number used to add Contacts to your Martus account.",Zugangsnummer
+accessibility,Noun,,
+account,Noun,,Konto
+account recovery,Noun,,Kontowiederherstellung
+account recovery code,Noun,,Kontowiederherstellungscode
+accountability,Noun,,Zurechenbarkeit
+accounting,,,
+acknowledge,Verb,"An acknowledgment in Peerio is similar to a message, but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is referred to as an ""acknowledgment""",bestätigen
+acknowledged,Adjective,"An acknowledgment in Peerio is similar to a message, but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is referred to as an ""acknowledgment""",bestätigt
+acknowledgment,Noun,"American English — A button in Peerio that functions similar to a message, but sends a ""thumbs up"" icon with a timestamp. The thumbs-up icon is referred to as an ""acknowledgment""",Bestätigung
+acquire,Verb,,erhalten
+activate,Verb,[Orbot],
+active,Adjective,,aktiv
+activists,,,
+activity,,,
+activity,Noun,,Aktivität
+ad provider,Noun,[Psiphon 3],
+ad-blocker,Noun,,Werbeblocker
+add,Verb,,hinzufügen
+add-on,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)",Erweiterung
+add-ons,Noun,,
+added,Adjective,,hinzugefügt
+address,Noun,,Adresse
+address,Verb,"(1) To address a situation
+Synonyms:  to fix, to take care of
+
+(2) Give to data or a data set an address in memory
+
+(3) If a letter, envelope, or parcel is addressed to you, your name and address have been written on it.",
+address bar,Noun,,Adressleiste
+address book,Noun,,Adressbuch
+admin,Noun,,
+administrative,,,
+administrators,Noun,,
+advance,,,
+advanced,Adjective,,erweitert
+advanced,Noun,it is a noun?,
+advanced search,Noun,[Martus],
+advanced user,Noun,,
+adversary,Noun,"Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.
+Source EFF.",Angreifer
+agenda notes,Noun,,
+agent,Noun,,
+air gap,Noun,"A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.
+Source EFF.
+
+An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated from all other networks.
+Source Wikipedia",
+air-gapped (air gapped),Adjective,,vom Netz getrennten
+airline miles,,,
+airlines miles,,,
+alpha,Noun,,Alpha
+alternate,Adjective,,alternativ
+alternate,Noun,,
+alternative,Adjective,,
+alternative,Noun,,
+ambiguous,Adjective,,mehrdeutig
+and/or,Conjunction,,und/oder
+anomaly,Noun,[Globaleaks],Anomalie
+anonymity,,,
+anonymity,Noun,[Orbot],Anonymität
+anonymization,Noun,"""It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous."" (Source: https://en.wikipedia.org/wiki/Data_anonymization)",Anonymisierung
+anonymize,Verb,"[Orbot] To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization) [Signal]",anonymisieren
+anonymizing,,,
+anonymous,,,
+anonymous,Adjective,[Orbot],anonym
+anonymously,,,
+anti-censorship,,,
+antivirus,Noun,"Software that attempts to protect a device from being taken over by malicious software (or “malware""). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.
+Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.
+Source EFF.",Antivirus
+anyone,,,
+app,Noun,"[Orbot] Abbreviation of ""application."" (Synonyms: application)",App
+app switcher,Noun,[Signal] Specific to iOS,
+application,Noun,"[Orbot] An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. (Source: https://en.wikipedia.org/wiki/Application_software) [Signal]",Anwendung
+apply,Verb,,anwenden
+appreciates,,,
+approach,Noun,,annähern
+approve,Verb,,annehmen
+archive,Noun,"An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.
+https://en.wikipedia.org/wiki/Archive_file",Archiv
+archive,Verb,[Signal],archivieren
+argument,Noun,,
+arrive,Verb,,ankommen
+article,Noun,,Artikel
+as root,Noun,,
+asset,Noun,"In threat modeling, any piece of data or a device that needs to be protected.
+Source EFF.",
+asymmetric-key encryption,Noun,"Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password ""bluetonicmonster"", you would need both the file and the secret ""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the ""public key"": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Public key encryption, Public key cryptography. (Source EFF)",
+at the Heart of Internet Freedom,,,
+attach,Verb,To attach a file to a message,anhängen
+attachment,Noun,[Signal] File sent together with an email or other electronic message.,Anhang
+attack,Noun,"In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an ""exploit.""
+Source EFF.",Angriff
+attacker,Noun,,Angreifer
+audio,Adjective,[Signal],
+audio,Noun,,Ton
+auth token,Noun,[Orbot],
+authenticate,Verb,,bestätigen
+authenticated,Adjective,,bestätigt
+authentication,Noun,[Signal],
+authentication ,Noun,[Signal],Bestätigung
+author,Noun,,Autor
+authorize,Verb,,gestatten
+automated traffic,Noun,,
+autonomous system number,Noun,,
+availability,,,
+availability,Noun,,
+available,Adjective,,verfügbar
+avatar,Noun,"A computer generated visual icon used as an alternative digital fingerprint. aka ""identicon"". [Signal]",Avatar
+back,,,
+back,Noun,As in “Back” button,zurück
+back,Verb,,
+back up,Verb,,
+background,Noun,Screen surface where text and graphic elements are displayed,Hintergrund
+backlog,Noun,Delayed processing of some sort,
+backup,Noun,"[Signal] [Orbot] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely.",Datensicherung
+badge,Noun,[Signal],
+balance,Noun,What is left to be paid or recovered.,Kontostand
+bandwidth,Noun,[Orbot],Bandbreite
+bank fees,,,
+bar,Noun,,Leiste
+bar chart,Noun,,
+bare-metal,Adjective,,
+base,,,
+batch select,Noun,[Signal],
+battery,Noun,,Batterie
+be careful,,,
+best-effort delivery,Noun,,
+beta,Noun,,Beta
+big data,Noun,,
+billing,,,
+binaries,Noun,,Programmdateien
+binary,Noun,"Binary file.
+8-bit encoded data file using only 0 and 1, different from ASCII which is 7-bit encoded.",Programmdatei
+block,,,
+block,Noun,,
+block,Verb,[Signal],
+blocked,Adjective,,blockiert
+blocked access,Noun,,blockierter Zugang
+blockfile,Noun,[I2P] http://www.i2p2.de/blockfile.html,
+blocking,Noun,"Synonyms: filtering, censoring Internet traffic.",
+blocking resistant,Adjective,,
+blog,Noun,,Blog
+blog post,Noun,"Short text posted to a blog, the content of which is left entirely to the discretion of the author.",Blogeintrag
+blogging,Noun,Posting to a blog and updating it regularly.,
+body,Noun,,Textkörper
+bookmark,Noun,,Lesezeichen
+boolean,Adjective,,boolesche(r)(s)
+boolean,Noun,,
+boot,Noun,[Orbot],
+boot,Verb,[Orbot],Systemstart
+bootable,Adjective,,
+bootloader,Noun,,
+bot,Noun,,
+botnet,Noun,,
+bounce,Verb,,
+bouncing,,,
+bounty,Noun,,Prämie
+box,Noun,,Kästchen
+break in,Noun,,Einbruch
+bridge,Noun,[Orbot] [Tor],Brücke
+bridge,Verb,[Tor],überbrücken
+bridge line,Noun,[Tor] a line with the bridge configuration,
+bridge relay,Noun,[Tor],
+bridge type,Noun,[Tor],
+broad range,,,
+broadcast,Verb,[Signal],
+browse,Verb,[Orbot],durchsuchen
+browser,,,
+browser,Noun,web browser,Browser
+browser fingerprint,Noun,"The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.
+Source EFF.",Browser Fingerabdruck
+browsing,,,
+buffer,Noun,,Puffer
+bug,Noun,,Fehler
+bug report,Noun,[Signal],Fehlermeldung
+bundle,Noun,,Bündel
+bundled,Adjective,,gebündelt
+burden,,,
+burner phone,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
+(Source: EFF)",Wegwerfhandy
+button,Noun,,Schaltfläche
+by,Adverb,,
+bypass,Verb,,vorbeikommen
+bytes,Noun,[Globaleaks],Bytes
+cache,Noun,,
+cache,Verb,,
+cache-busting,Noun,,
+calendar,Noun,,
+camera,Noun,,
+cams,,,
+can,Verb,,
+cancel,Verb,[Signal],abbrechen
+cannot,Verb,,
+capability,Noun,"The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has"" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
+Source EFF.",
+car documents,Noun,[Umbrella],
+carjacking,Noun,,
+carry,,,
+case management,Noun,[GlobaLeaks],
+cash,,,
+cc,Noun,“carbon copy”,
+censor,,,
+censored,,,
+censored,Adjective,,
+censorship,,,
+censorship,Noun,[Signal],
+cerificate,,,
+certificate,Noun,,Zertifikat
+certificate,Verb,To give a certificate,beglaubigen
+certificate authority,Noun,,
+certificate chain,Noun,[Globaleaks],Zertifikatskette
+certificate chain file,Noun,[Globaleaks],
+certificates,Noun,"Is it needed, the plural form defined here? The singular already exists.",Zertifikate
+chain,Noun,,Kette
+change,Verb,,
+change log,Noun,,
+charges,,,
+chart,Noun,,
+chat,Noun,[Signal],Unterhaltung
+chat,Verb,[Signal],
+check,Verb,,überprüfen
+checking,,,
+checkpoint,Noun,,
+checksum,Noun,,
+choke,Verb,,
+chokepoint,Noun,,
+choker,Noun,,
+choose,Verb,,
+choose ,Verb,,
+chronic stress,Noun,,
+cipher,Noun,,
+ciphertext,Noun,,Geheimtext
+circuit,Noun,[Orbot],Schaltkreis
+circuits,,,
+circuits,Noun,,
+circumvent,Verb,[Orbot],umgehen
+circumvention,Noun,[Signal] [Orbot],Umgehung
+clear,Verb,[Signal] [Orbot],Löschen
+cleartext,Noun,,Klartext
+click,Noun,,
+click,Verb,[Signal],anklicken
+click and hold,Verb,,anklicken und halten
+clickjacking attack,Noun,,
+client,Noun,"[Signal] [Orbot] As in ""desktop client"" or ""Android client.""",Programm
+clipboard,Noun,[Signal],
+clock skew,Noun,,
+close,Verb,,schließen
+cloud,,,
+cloud server,Noun,[Orbot],
+cloud storage,Noun,,Cloud-Speicher
+coarse data,Noun,Unprocessed data,
+code,Noun,,
+codec,Noun,,Codec
+collected,,,
+collection,,,
+collection,Noun,,
+collusion,Noun,,
+collusion attack,Noun,,
+color,Noun,,
+column,Noun,,Spalte
+command,Noun,,Befehl
+command and control server,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: C&C, C2.
+Source EFF.",
+command line,Noun,,Kommandozeile
+comment,Noun,[Globaleaks],
+commercial VPN,Noun,"A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, or untrusted local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The down side is that most of the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to snoop on your traffic.
+Source EFF.",
+communicate,Verb,,"kommunizieren, mitteilen"
+communication,,,
+communication,Noun,,
+community,,,
+community,Noun,,Community
+community center,Noun,,Community-Center
+companies,,,
+compartmentalization,Noun,,
+compartmentalize,Verb,,
+compatible,Adjective,,Kompatibel
+complete,Verb,,abschließen
+completed,Adjective,,abgeschlossen
+compose,Verb,[Signal],verfassen
+compressed,Adjective,,
+compression,Noun,,Kompression
+compression/decompression tool,Noun,,
+compromise,Verb,,
+compromised,Noun,[Globaleaks],kompromittiert
+computer,Noun,[Signal],Computer
+concern,,,
+concordance,Noun,,
+conference,Noun,,Konferenz
+conferences,,,
+confidentiality,Adjective,[Globaleaks] [Orbot],vertraulich
+configuration,Noun,[Globaleaks] [Orbot],Konfiguration
+configure,Verb,[Signal] [Orbot],
+confirm,Verb,,
+connect,Verb,[Signal],
+connecting,Verb,,
+connection,,,
+connection,Noun,[Orbot],Verbindung
+consensus,Noun,,
+constraint,Noun,,
+contact,Noun,[Signal] [Martus] Another Martus user with whom you can share your Martus bulletins.,Kontakt
+contact info,Noun,,
+contact information,Noun,,
+contact request,Noun,,Kontaktanfrage
+content,Noun,,
+context,Noun,"[Globaleaks] Tips are classifies in contexts, e.g. corruption",Kontext
+control panel,Noun,,Systemsteuerung
+control port,Noun,,Steueranschluss
+conventional,Adjective,,
+conversation,Noun,"A ""conversation"" is the same as a message ""thread"" [Signal]",Unterhaltung
+cookie,Noun,"[Orbot] Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in. (Source : EFF)",
+cookies,Noun,,
+copy,Verb,,
+corporate foundation,,,
+corporate intranet,Noun,"Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.
+Source EFF.",
+country,,,
+crack,,,
+crash,Noun,,
+crash report,Noun,,
+create,Verb,,
+credentials,Noun,,
+credit card,,,
+credits,Noun,,
+critical,,,
+cropping,Noun,,
+cross-certification,Noun,,
+crucial,Adjective,,notwendig
+cryptocurrency,Noun,,
+cryptographers,,,
+cryptographic signature,Noun,"The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
+Synonyms: digital Signature
+Source EFF.",
+cryptography,Noun,"The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.
+Source EFF.",
+cryptoparty,Noun,"When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others ""I believe this key belongs to this person -- and if you trust me, you should believe that too."" Telling the world that you trust someone's key is called ""signing their key"": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to other friends.
+Synonyms: key-signing party.
+Source EFF.",
+"crítico, críticos, de segurança pessoal da informação",,,
+current,Adjective,,
+currently,,,
+curriculum for trainers,Noun,,
+custidoan,Noun,,
+custodian,Noun,[Globaleaks],
+custom,Adjective,,
+customer support,Noun,,Kundendienst
+customization,Noun,[Globaleaks],Anpassung
+customize,Verb,,
+cut,Verb,,
+daemon,Noun,,
+dashboard,Noun,,
+data,Noun,[Signal] [Orbot],
+data package,Noun,,
+data retention,Noun,,
+data storage,Noun,,Datenspeicherung
+data-Driven Dropdown (Field),Noun,[Martus],
+database,Noun,[Signal],
+datastore,Noun,http://en.wikipedia.org/wiki/Datastore_network,Datenspeicher
+date range,Noun,,Datenbereich
+day,Noun,,
+deactivate,Verb,[Orbot],
+debit,,,
+debriefing,Noun,,
+debug,Verb,,Fehlerdiagnose
+debug log,Noun,[Signal],
+debug mode,Noun,,
+debugging,Noun,,
+deck,Noun,[Ooniprobe] This is a collection of ooniprobe tests and inputs.,
+decline,Verb,"[Signal] To reject. As in ""Decline an incoming call.""",ablehnen
+declined,Verb,,
+decompression,Noun,,Dekomprimieren
+decorating,,,
+decrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption of data. [Signal],entschlüsseln
+decrypted,Adjective,[Signal],entschlüsselt
+decryption,Noun,[Orbot],Entschlüsselung
+dedicated server,Noun,[Globaleaks],Dezidierter Server
+deductible,,,
+deepending,Adjective,,
+default,Adjective,[Globaleaks] [Signal] [Orbot],Standard
+default,Noun,[Orbot],Standard
+default server,Noun,,Standardserver
+defenders,,,
+delay,Noun,,
+delete,Verb,[Globaleaks] [Signal],löschen
+deleted,Adjective,,gelöscht
+deletion,Noun,[Globaleaks],Löschung
+deprecated,Adjective,,
+descriptor,Noun,"Identification item for a file, a program or a data.",
+deselect,Verb,,
+desktop,Noun,[Signal],Schreibtisch
+destroy,Verb,Removes message/file from the entire Peerio server and all users' accounts,vernichten
+detail,Noun,[Signal],
+detection,Noun,,
+deter,,,
+device,Noun,[Signal] [Orbot],Gerät
+dialog,Noun,,Dialog
+diceware,Noun,,
+digital,Adjective,,
+digital,Noun,,
+digital certificate,Noun,"A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
+Synonyms: Security certificate.
+Source EFF.",
+digital signature,Noun,"The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
+Synonyms: cryptographic signature.
+Source EFF.",
+diplomats,,,
+directory,Noun,[Signal],
+directory authorities,Noun,,
+disable,Verb,[Signal] [Orbot],deaktivieren
+disabled,,,
+disabled,Adjective,,
+disabled,Verb,,deaktiviert
+disappearing message,Noun,[Signal],
+discard,Verb,[Signal],Verwerfen
+disclaimer,Noun,,
+disconnect,Verb,[Signal],
+discouraged,,,
+discussion,Noun,,
+disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of removable storage device (USB, CD, floppy disk etc.)",
+diversify,,,
+document,Noun,[Signal],
+domain,Noun,An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube.,Domain
+domain name,Noun,"The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF)",
+domestic violence survivors,,,
+donating,,,
+donation,,,
+donations,,,
+donations,Noun,"feminine noun, otherwise a (V) verb. 
+eu doo
+tu doas
+ele doa
+nós doamos
+vós doais
+eles doam",
+donations options,,,
+donor,Noun,,
+download,,,
+download,Noun,[Globaleaks],Download
+download,Verb,[Globaleaks],herunterladen
+draft,Noun,,Entwurf
+drag,Verb,,ziehen
+drop-down list,Noun,,Auswahlliste
+dual boot,Noun,,
+ePub Reader,Noun,,
+eQualitie,Noun,Do not translate,
+eavesdropper,Noun,,
+eavesdroppers,,,
+edit,Verb,,bearbeiten
+eepsite,Noun,,
+eligibility criteria,Noun,,
+email,,,
+email,Noun,,
+email address,,,
+email address,Noun,,E-Mail-Adresse
+email identity (e-mail identity),Noun,Synonym: e-mail identity,
+email provider,Noun,,E-Mail-Anbieter
+"email, e-mail",Noun,Synonym: e-mail,E-Mail
+emailing,,,
+embedded,Adjective,,
+emoji,Noun,[Signal],
+enable,Verb,[Signal] [Globaleaks] [Orbot],aktivieren
+enabling,,,
+encoded,Adjective,,
+encrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption of data. [Signal],verschlüsseln
+encrypted,Adjective,[Globaleaks],verschlüsselt
+encrypted communication,Noun,,
+encrypted message,Noun,,
+encrypted persistent storage,Noun,[Tails],
+encryption,Noun,"[Globaleaks] [Orbot] A process that takes a message and makes it unreadable except to a person who knows how to ""decrypt"" it back into a readable form. (Source: EFF)",Verschlüsselung
+encryption key,Noun,"[Globaleaks] An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different. (Source: EFF)",Schlüssel
+end-to-end,Conjunction,,Ende-zu-Ende
+end-to-end encryption,Noun,"End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption. (Source: EFF) [Signal]",
+end-user,Noun,,
+engine,,,
+ensure,,,
+enter,Verb,,eingeben
+entry guard,Noun,,Eingangswächter
+error,Adjective,,
+error,Noun,[Signal],Fehler
+event log,Noun,,
+exception,Noun,,
+exchange,Verb,,
+excited,,,
+executable,Noun,,
+exercised,,,
+exit,Noun,,
+exit,Verb,,verlassen
+exit relay,,,
+exit relay,Noun,,Exit-Server
+exited,Verb,,Verlassen
+experience,Verb,,
+expiration,Noun,,
+expiration date,Noun,,Ablaufdatum
+expire,Verb,[Signal],
+expired,Noun,,
+expiry,Noun,[Globaleaks],Ablauf
+expiry,Verb,[Signal],
+export,Noun,[Signal],
+export,Verb,[Signal],exportieren
+extend,Verb,[Globaleaks],
+extension,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: Add-on, Plugin)(Source: EFF)",
+extent,,,
+external storage,Noun,,
+extract,Verb,,extrahiert
+fail,Verb,[Signal],fehlgeschlagen
+failed,Adjective,,fehlgeschlagen
+faq,,,
+fax,Noun,[Signal] As in “fax machine.”,
+feature,Noun,[Signal],
+feature set,Noun,,
+feed,Noun,E.g. RSS feed,
+feedback,,,
+fees,,,
+fetch,Verb,[Signal],
+ficheiro,Noun,,
+field,,,
+field,Noun,[Globaleaks] A data entry field,Feld
+figuring out,,,
+file,Noun,A data entry field [Signal] [Globaleaks],Datei
+file ,Noun,,
+file attachment,,,
+file attachment,Noun,[Globaleaks],Dateianhang
+file container,Noun,,
+file sharing,Noun,,gemeinsamer Dateizugriff
+filed,,,
+filesystem,Noun,,
+filled out,,,
+filter,Noun,,
+financial,,,
+financially,,,
+find,Verb,,
+fingerprint,Noun,"[Orbot] The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits. So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.
+Source EFF.",Fingerabdruck
+fingerprint identification,Noun,,
+firewall,Noun,"[Orbot] A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways. (Source: EFF)",
+fits,,,
+fix,Noun,,
+fix,Verb,,Korrektur
+flight vouchers,,,
+floodfill,Noun,,
+floodfill peer,Noun,,
+folder,Noun,[Signal],Ordner
+follow,Verb,,
+for,Preposition,,
+form,,,
+forum,Noun,[Signal],
+forward,,,
+forward,Verb,"[Signal] As in, “to forward an email or a message.”",
+foundations,,,
+fragment,Noun,,
+fraudulent ,,,
+free,,,
+free,Adjective,,
+freedom,Noun,[Orbot],
+freedoms,,,
+frontdesk,,,
+full restricted route,Noun,,
+fund us,,,
+funding,,,
+furthering,,,
+gateway,Noun,,
+gender,Noun,,
+general,Adjective,,generell
+generate,Verb,"As in ""generate key"" [Signal]",erzeugen
+generation,Noun,,
+generation ,Noun,,Erzeugung
+generator,Noun,,
+generator ,Noun,,
+geo-location,Noun,,
+geography-based blocking,,,
+gift,,,
+gift cards,,,
+gift matching,,,
+gist,Noun,"""In computing, Gist is a scientific graphics library written in C by David H. Munro of Lawrence Livermore National Laboratory. It supports three graphics output devices: X Window, PostScript, and Computer Graphics Metafiles (CGM). The library is promoted as being small (writing directly to Xlib), efficient, and full-featured. "" -https://en.wikipedia.org/wiki/Gist_(computing) [Signal]",
+giving,,,
+goal,Noun,,
+grants,,,
+guard,Noun,,Wächter
+guard relay,Noun,[The Tor Project],Wächterrelais
+guidelines,Noun,,
+handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,
+hardware,,,
+header,Noun,,
+help,Noun,,Hilfe
+help,Verb,,helfen
+helper link,Noun,,
+helper link ,Noun,,
+hidden service,Noun,,
+hidden services,,,
+hidden volume,Noun,[VeraCrypt],
+hide,Verb,,verstecken
+high bandwidth,Noun,,
+high capacity,Noun,,
+high latency,Noun,,
+high-quality,,,
+hint,Noun,,
+history,Noun,"As in ""Browser History""",Verlauf
+home,Noun,[Globaleaks],
+home directory,Noun,,Startseite
+hoodie,,,
+hoodie,Noun,,
+hoodies,,,
+host,Noun,[Signal] [Globaleaks] [Orbot],
+host,Verb,[Orbot],
+hostname,Noun,,Hostname
+hostnames,Noun,,
+hour,Noun,,
+however,,,
+https://tb-manual.torproject.org/en-US/bridges.html,,,
+human rights,,,
+human rights,Noun,,Menschenrechte
+human rights abuses,,,
+i.e.,Noun,,
+iCloud,Noun,[Signal],
+iOS,Noun,,
+iPhone,Noun,,
+ice breakers,Noun,,
+icon,Noun,[Signal] [Orbot],
+identicon,Noun,"A computer generated visual icon used as an alternative digital fingerprint. aka ""identicon"".
+Synonym: avatar",
+identity,Noun,[Orbot],Identität
+ignore,Verb,,ignorieren
+illegal,,,
+illustrated,Adverb,,
+illustrated ,Adverb,,
+image,Noun,,Abbild
+implement,,,
+import,Noun,[Signal],
+import,Verb,[Signal],importieren
+improve,Verb,,verbessern
+in touch,,,
+in-transit encryption,Noun,,Transportverschlüsselung
+inactivity timeout,Noun,,
+inbox,Noun,,[Post]eingang
+include,Verb,,einschließen
+incognito,Noun,[Signal],
+income,,,
+incoming,Adjective,[Signal],
+incompatible,Adjective,,inkompatibel
+incremental,Adjective,,
+individuals,,,
+info,Noun,,Info
+information,Noun,,
+informator,Noun,[Globaleaks],
+input,Noun,,Eingabe
+input,Verb,[Globaleaks],Eingabe
+inquiries,,,
+install,Verb,[Orbot],
+installation,Noun,,Installation
+installer,Noun,,
+institutions,,,
+intended,,,
+intercept,Verb,[Signal],
+interface,Noun,,
+internet,Noun,[Signal] [Orbot],
+internet ,,,
+"internet filtering, content filtering",Noun,[Orbot] Filtering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF),
+interrupt,Verb,,unterbrechen
+intranet,Noun,,Intranet
+invalid,Adjective,[Orbot],Ungültig
+involved,,,
+iptables,Noun,"[Orbot] ""iptables is a user-space utility program that allows a system administrator to configure the tables[2] provided by the Linux kernel firewall (implemented as different Netfilter modules) and the chains and rules it stores. Different kernel modules and programs are currently used for different protocols; iptables applies to IPv4, ip6tables to IPv6, arptables to ARP, and ebtables to Ethernet frames."" (Wikipedia)",
+isim,,,
+isolate,Verb,,
+isolation,Noun,,
+issue,Noun,[Signal],
+jar,Noun,"“A JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.” (https://en.wikipedia.org/wiki/JAR_(file_format))",
+jump service link,Noun,,
+kernel,Noun,,
+key,Noun,"In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. (Source EFF) [Globaleaks] [Signal]",Schlüssel
+key ID,Noun,,Schlüsselkennung
+key code,Noun,[Globaleaks],
+key list,Noun,,
+key owner,Noun,,
+key pair,Noun,"To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a ""key pair.""
+Source EFF.
+Synonym: keypair",Schlüsselpaar
+key password,Noun,,Schlüsselpasswort
+key size,Noun,,
+keyboard,Noun,[Signal],
+keychain,Noun,,Schlüsselbund
+keypair (key pair),Noun,,
+keyring,Noun,"If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring.
+Source EFF.",Schlüsselbund
+keyserver,Noun,,Schlüsselserver
+keyword,Noun,,Schlüsselwörter
+kidnapping,Noun,,
+kind,,,
+kinds,,,
+label,Noun,[Globaleaks],Bezeichnung
+language,Noun,[Globaleaks],
+large,,,
+launch,Noun,,starten
+launch,Verb,[Signal],
+law enforcement,Noun,"Sometimes used for ""law enforcement agencies"".",Strafverfolgung[sbehörden]
+law enforcement agency,Noun,,
+learn,,,
+legal,,,
+legal costs,,,
+legitimate,Adjective,,
+library,Noun,"Refers to a ""library"" in computing",
+license,Noun,,
+license ,Noun,,Lizenz
+licensing,Noun,,
+limited edition,,,
+line-of-sight,Noun,,
+link,Noun,,Verweis [HTML-Link]
+link,Verb,[Signal],
+linked device,Noun,[Signal] A mobile phone with a Signal account that is connected to a Signal Desktop account.,
+little,,,
+live,Adverb,,live
+load,Noun,[Globaleaks],
+load,Verb,[Globaleaks] [Signal],laden
+loading,Verb,[Globaleaks],
+locate,Noun,,
+located,,,
+location,Noun,,Ort
+lock,Verb,,
+lock icon,Noun,,
+log,Noun,[Signal] [Orbot],
+log,Verb,[Globaleaks],Protokoll
+log data,Noun,,
+log file,Noun,,
+log in,Verb,,anmelden
+logged in,Adjective,[Globaleaks],eingeloggt
+logging,,,
+logging,Noun,,
+login,Noun,[Globaleaks],Einloggen
+logo,Noun,,
+logout,Noun,[Globaleaks],"abmelden, Ausloggen"
+long,Adjective,[Globaleaks],
+low latency,Noun,,
+macOS,Noun,[Signal],
+machine learning,Noun,,
+mail,,"In Português when you say ""Mail"" we understand it as ""snail mail"" that in Português means, ""correio""",
+mail,Noun,,E-Mail
+mailbox,Noun,,Postfach
+mailing,,,
+mailing address,,,
+mailing list,Noun,,
+main menu,Noun,,Hauptmenü
+maintain,Verb,,aufrecherhalten
+manifest,Noun,,Manifest
+manual,Adjective,,
+master key,Noun,,Hauptschlüssel
+match,Verb,,
+match ,Verb,,
+matching,,,
+"mbps, MB/s",Noun,[Orbot] megabytes per second,
+mechanism,,,
+media,Noun,[Signal],
+media message,Noun,[Signal],
+member,,,
+membership program,,,
+menu,Noun,,Menü
+menu bar,Noun,[Signal],
+message,Noun,[Signal],Nachricht
+message body,Noun,,Textkörper
+message thread,Noun,"Alternative to ""conversation""",Unterhaltung
+messaging,Noun,[Orbot],Sofortnachrichten
+meta search engine,,,
+metadata,Noun,"Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF) [Signal]",Meta-Daten
+method,,,
+microphone,Noun,[Signal],
+middle relay,Noun,,
+migrate,Verb,[Signal],
+miniLock,Noun,,miniLock
+minimize,Verb,Minimize a window,
+ministreaming library,Noun,[I2P],
+minute,Noun,,
+mirror,Noun,,
+miscellaneous,Adjective,,sonstiges
+missing,,,
+mixed content,Noun,,gemischte Inhalte
+mobile,Adjective,,
+mobile data,Noun,,
+mobile devices,,,
+mobile notifications,Noun,,Mobiltelefon-Benachrichtigungen
+mobile number,Noun,,Mobilrufnummer
+modal,Adjective,,
+mode,Noun,[Globaleaks] [Orbot],Modus
+modes,,,
+module,Noun,,
+money order,,,
+monitor,,,
+month,Noun,,
+mount,Verb,,einhängen
+mouse,Noun,,Maus
+move,Verb,,verschieben
+multi-boot,Noun,,
+multimedia,Adjective,[Signal],
+mute,Noun,[Signal],
+mute,Verb,,
+name,,,
+name,Noun,,Name
+nameserver,Noun,,
+nearly,,,
+neighborhood,Noun,,Nachbarschaft
+network,,,
+network,Noun,[Signal] [Orbot],Netzwerk
+network admin,Noun,,
+network administrator,Noun,,
+network request,Noun,,
+networking,Noun,,
+new,Adjective,,Neu
+nickname,Noun,,Spitzname
+"nickname, nick",Noun,[Orbot],
+node,Noun,[Orbot],
+non-financial,,,
+non-private,,,
+non-profit organization,,,
+nonprofits,,,
+note,Noun,,merke
+notification,Noun,[Globaleaks] [Signal],Benachrichtigung
+notify,Verb,,
+obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",verschleiern
+obfuscation,Noun,"Transformation of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",
+obfuscation layer,Noun,"Related to data transmission
+[Tor]",
+offline,Adjective,[Signal],
+onboarding,Noun,,
+once,,,
+onion service,Noun,[Tor],Onion-Dienst
+online,,,
+online,Adjective,[Signal],
+open,Adjective,,
+open,Verb,,öffnen
+open source,Noun,[Orbot],
+open-source,Adjective,[Orbot],Open Source
+opened,Verb,,geöffnet
+operate,,,
+operator,Noun,,
+opt,,,
+optical,Adjective,,optisch
+optimization,Noun,[Orbot],
+optimize,Verb,[Signal] [Orbot],
+option,Noun,,optionen
+optional,Adjective,,
+options,,,
+or via,,,
+order,Verb,[Globaleaks],
+organizations,,,
+organize,Verb,,organisieren
+other,Adjective,,
+outer volume,Noun,,
+outgoing,Adjective,[Signal],
+output,Noun,,Ausgabe
+overlay,Noun,,
+overview,,,
+overview page,,,
+owner,Noun,,Eigentümer
+ownership,Noun,,Eigentum
+pack,,,
+package,Noun,,packet
+package manager,Noun,,
+padding,Noun,[Orbot],
+pager,Noun,[Signal],
+paid,,,
+pair,Verb,"To link devices, using bluetooth for example. [Signal]",
+paper,Noun,,
+paperwork,,,
+paravirtualization,Noun,"""Paravirtualization"" An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.",
+parent,Adjective,,
+parse,Verb,,
+part,Noun,,Teil
+partial,Adjective,,
+partially,Adverb,,
+partition,Noun,"""Disk partitioning or disk slicing[1] is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately."" -https://en.wikipedia.org/wiki/Disk_partitioning",
+passcode,Noun,A user-chosen and device-specific password. [Signal],Passcode
+passphrase,Noun,A computer-generated set of 6-10 random words used as the primary authentication for Peerio accounts. [Signal],Passphrase
+password,Noun,"A secret meant to be memorized, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a ""passphrase"" to remind us that it's not just one ""word."" A main password to unlock other passwords in a password manager or password safe application is often called a ""master password.”
+Source EFF.",Passwort
+passwords,Noun,,
+paste,Noun,,
+paste,Verb,,
+path,Noun,,Pfad
+payload,Noun,,
+payment,,,
+peer,Noun,,
+peer reviewed,Adjective,,von Experten geprüft
+peer-to-peer,,,
+peers,Noun,,
+pending,Adjective,[Signal],ausstehend
+penetration test,Noun,,
+perceived performance,Noun,,
+performance,Noun,,
+permission,Noun,[Signal] [Orbot],
+persistence,Adjective,,beständig
+persistence,Noun,,beständige Datenpartition
+persistence partition,Noun,,permanente Partition
+persistent,Adjective,,beständig
+persistent overlay,Noun,,beständige Überlagerung
+persistent storage,Noun,[Tails],beständige Datenpartition
+persistent volume,Noun,,beständige Datenpartition
+phishing,Noun,,
+physical surveillance,Noun,,
+pin,Verb,"Pin a tab, a site in a browser.",
+ping,Noun,[Globaleaks],
+please,Adverb,,
+please mail,,,
+pluggable transports,Noun,,
+plugin,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: add-on, extension)(Source: EFF)",Erweiterung
+policies,Noun,,Richtlinien
+policies,Verb,,
+policy,Noun,,Richtlinie
+policymakers,,,
+popup,Noun,,
+popup window,Noun,,
+port,Noun,[Signal] [Globaleaks] [Orbot],Anschluss
+portable,Adjective,,
+postponed,Adjective,[Globaleaks],aufschieben
+predecessor attack,Noun,,
+preenchido,,,
+preference,Noun,[Globaleaks],Einstellung
+preferences,Noun,[Globaleaks] [Signal],Einstellungen
+preferences page,Noun,[Globaleaks],
+preferred,,,
+prevent,,,
+prevent,Verb,,verhindern
+prevents,,,
+preview,Noun,[Globaleaks],Vorschau
+preview,Verb,[Signal],
+privacy,,,
+privacy,Noun,[Signal] [Orbot],
+privacy advocates,,,
+privacy notice,Noun,,
+privacy officer,Noun,,
+privacy-enhancing,,,
+private,,,
+private,Adjective,,
+private browsing,,,
+private key (secret key),Noun,,privater Schlüssel
+privoxy,Noun,,
+probing,Verb,,
+process,,,
+process,Noun,,
+process,Verb,[Signal],
+processed,Adjective,,verarbeitet
+processor,,,
+profile,Noun,[Signal],Profil
+program,Noun,,Programm
+proof,Noun,,
+proofs,Noun,,
+properly,Adverb,,richtig
+protects,,,
+protocol,Noun,"[Orbot] A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called ""http"". Some protocols use encryption to protect their contents. The secure version of the http protocol is called ""https"". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure  messaging. (Source EFF)",
+prototype,Noun,,
+provide,,,
+provider,Noun,,
+providers,,,
+proxied,Adjective,,vermittelt
+proxied site,Noun,,Vermittelte Seiten
+proxy,Noun,[Orbot],
+proxy,Verb,[Orbot],
+proxy test,Noun,,Vermittlungsservertest
+proxychains,,,
+public account ID,Noun,The Martus account's public identifier,Öffentliche Kontokennung
+public code,Noun,,
+public key,Noun,,öffentlicher Schlüssel
+public key / public account key,Noun,[Martus] The Martus account's public key,Öffentlicher Schlüssel
+public key infrastructure,Noun,,
+publicly,,,
+publish,,,
+publish,Verb,,
+pull,Noun,9,
+pull,Verb,"In the context of commits (GitHub, GitLab etc.)",
+purpose,,,
+push framework,Noun,[Signal],
+push notification,Noun,[Signal],
+quality-wise,,,
+qube,Noun,[QubesOS] A user-friendly term for a VM in Qubes OS.,
+question,Verb,,
+questionaire,Noun,,
+queue,Verb,"To form or wait in a line. ""Queued"" messages may be waiting to be sent for example. [Signal]",
+quit,Verb,[Signal],
+range,,,
+range,Noun,[Globaleaks],
+read receipt,Noun,[Signal],
+read-only,Adjective,,schreibgeschützt
+reader,Noun,,
+receipt,,,
+receipt,Noun,[Globaleaks],Empfangsbestätigung
+receive,Verb,,
+receiver,Noun,,
+recipient,Noun,[Globaleaks] [Signal],Empfänger
+recommend,,,
+recommend,Verb,,empfehlen
+reconnect,Verb,,"erneut verbinden, wieder verbinden"
+record,Noun,,"Eintrag, Datensatz"
+record,Verb,,
+records,,,
+recover,Verb,"Recover data, an account, etc.",wiederherstellen
+recover an amount,Verb,"Recover money that you have spent, invested, or lent, you get the amount back.",
+redact,,,
+redacted,Verb,,
+reenter,Verb,,
+referral code,Noun,,
+refund,,,
+refunded,,,
+register,Verb,,Benutzerkonto anlegen
+regular,Adjective,,
+regular expression,Noun,,
+reinstall,Verb,[Signal],
+reject,,,
+relay,,,
+relay,Noun,[Orbot],Relais
+relay,Verb,[Signal],weiterleiten / umleiten
+relay directory,Noun,,
+relay node,Noun,[Orbot],
+relays,,,
+relays,Noun,,
+release,Noun,,Veröffentlichung
+release,Verb,,
+release candidate,Noun,,
+release notes,Noun,[Signal],
+relink,Verb,[Signal],
+reload,,,
+reload,Verb,[Globaleaks],neu laden
+rely,,,
+remaining,Adjective,,verbleibend
+remains,,,
+remove,Verb,,entfernen
+rename,Verb,,umbenennen
+render,Verb,,
+rendering,Adjective,,
+rendering,Noun,,
+rent,,,
+report,,,
+report,Noun,[Globaleaks],Bericht
+report,Verb,[Signal],berichten
+reporting,,,
+repository,Noun,,
+request,,,
+request,Noun,[Globaleaks],Anforderung
+request,Verb,,anfordern
+required,,,
+required fields,,,
+requires,,,
+rescan,Verb,,erneut durchsuchen
+research,,,
+researchers,,,
+resend,Verb,,
+reserve,,,
+reset,Noun,,
+reset,Verb,[Globaleaks] [Signal] [Orbot],zurücksetzen
+resolver,Noun,,
+resources,,,
+restart,Noun,,Neustart
+restart,Verb,[Globaleaks] [Signal] [Orbot],Neustart
+restore,Verb,[Signal] [Orbot],wiederherstellen
+restrict,,,
+restricted route,Noun,,
+restriction,Noun,,
+retained,Verb,,
+retrieve,Verb,(from server),abrufen
+review,Verb,,
+revision,Noun,,
+revokation certificate,Noun,,Widerrufszertifikat
+revoke,Verb,,
+revoke ,Verb,,widerrufen
+revoked,Adjective,,widerrufene(n)
+ring,Verb,[Signal],
+rip,Verb,,
+robust,,,
+role,Noun,[Globaleaks],
+rooftop,Noun,,"Hausdach, Hausdächer (pl)"
+room,Noun,,Raum
+root,Adjective,,Wurzel
+root,Verb,,
+root domain,Noun,,
+"root, root directory",Noun,[Orbot],
+route,Noun,,
+route,Verb,[Orbot],
+router,Noun,,
+router console,Noun,,
+router console ,Noun,,Routerkonsole
+routing,Noun,,
+row,Noun,,
+rule,Noun,,
+ruleset,Noun,,Regelsatz
+run,,,
+run,Verb,,ausführen
+running,,,
+safe,,,
+safely,,,
+safely,Adverb,,
+safety number,Noun,[Signal],
+sandbox,Noun,,Sandkasten
+sanitize,Verb,,
+save,Verb,[Globaleaks],speichern
+scale,Verb,[Signal],
+scan,Verb,[Orbot],
+scope,Noun,[Globaleaks],
+score,Noun,,
+scour,Verb,,
+scramble,Verb,,
+scroll,Verb,[Signal],
+scroll bar,Noun,,
+search,,,
+search,Verb,[Signal],suchen
+search engine,Noun,[Orbot],
+search index,Noun,,Suchindex
+search provider,Noun,,
+second,Noun,,
+secure,,,
+secure,Adjective,[Signal] [Orbot],sicher
+secure,Verb,[Signal],
+secureApp,Noun,Name of the application.,
+securely,Adverb,,
+security,,,
+security,Noun,[Orbot],Sicherheit
+security background,Noun,,Sicherheitshintergrund
+security level,Noun,,Sicherheitsstufe
+security log,Noun,,Sicherheitsprotokoll
+security vulnerability,Noun,,
+seed,Verb,,
+select,Verb,,auswählen
+selected,Adjective,,ausgewählt
+selection,Noun,,Auswahl
+selector,Noun,[Globaleaks] [Signal],
+sell,,,
+sell,Verb,,
+send,Verb,,[ver]senden
+sender,Noun,[Signal],
+separate,Adjective,,
+separate,Verb,,
+server,Noun,[Globaleaks] [Signal] [Orbot],Server
+service,Noun,,
+service provider,Noun,,
+session,Noun,[Signal],
+set,Noun,,
+set,Verb,,einstellen
+set up,,,
+set up,Verb,,Einrichten
+setting,Verb,"P.Ex. ""Error setting new password""",
+setup,Noun,,
+share,,,
+share,Noun,,
+share,Verb,,
+shortly,,,
+shovel coal,,,
+shovel coal (slang word),,,
+show,Verb,,
+shown,Verb,,
+shut down,Verb,,Herunterfahren
+shutdown,Noun,,
+shutting down,Verb,[Globaleaks],
+sidebar,Noun,,Seitenleiste
+sideload,Verb,x,
+sign,Noun,,
+sign,Verb,,signieren
+sign in,Verb,[Globaleaks],Einloggen
+sign out,Verb,,
+sign up,,,
+signature,Noun,,Signatur
+signed,Adjective,,
+signing key,Noun,,
+signup form,Noun,,
+similar,,,
+single,,,
+site,Noun,Website,"Standort, Seite / Internetseite"
+site operator,Noun,,
+size,,,
+size,Noun,,Größe
+sizing up,,,
+slider,Noun,[Signal],
+small,,,
+smartphone,Noun,,Smartphones
+snail mail,,,
+software,,,
+software,Noun,[Globaleaks] [Signal],Software
+source,,,
+source,Noun,[Globaleaks],Quelle
+spam,Noun,,Spam
+specific,,,
+specified,,,
+specify,Verb,,angeben
+spend,,,
+spends,,,
+spin,Verb,,
+split,Verb,,teilen
+split GPG,Noun,"""Split GPG"" is the name of a feature. For reference: https://www.qubes-os.org/doc/split-gpg/",
+split bar,Noun,,
+split package,Noun,,
+sponsor,Noun,,
+sponsor,Verb,,
+spoof,Verb,,
+spoofing,Noun,,Manipulation / Vortäuschung
+spooled,Adjective,[Globaleaks] context: spooled emails,
+spreadsheet,Noun,,
+staff,,,
+staffing,,,
+standalone,Adjective,[Signal],
+standard,Adjective,[Orbot],
+standard,Noun,,
+start,Noun,,
+start,Verb,[Globaleaks],starten
+startup,Noun,,
+state,Noun,,
+statements,,,
+statistics,Noun,,
+status,,,
+status,Noun,[Globaleaks],Status
+stay,Verb,,
+stay in,Verb,,
+sticker,Noun,[Signal],
+stickers,,,
+stolen,,,
+stop,Verb,,
+storage,Noun,[Signal],Speicherplatz
+stream,Noun,,
+streaming library,Noun,,Streaming-Bibliothek
+strip,Verb,,
+stuff,,,
+subject,Noun,[Globaleaks],Betreff
+subkey,Noun,,Teilschlüssel
+subkeys,Noun,,
+submission,Noun,[Globaleaks],Einreichung
+submit,Verb,[Signal],Absenden
+submitter,Noun,[GlobaLeaks],Einreicher
+submitting,,,
+subscription,Noun,,
+substatus,Noun,[GlobaLeaks],
+such as,,,
+suggested,Adjective,,vorgeschlagen
+suggestion,Noun,,Vorschlag
+suitable,Adjective,,passend
+summary,,,
+summary,Noun,,Zusammenfassung
+summary_large_image,,,
+superuser,Noun,Synonym: root,Systemverwalter
+support,Noun,"[Signal] As in ""support page"" or ""customer support.""",Unterstützung
+support,Verb,,unterstützen
+support portal,Noun,,
+supported,Adjective,,unterstützt
+supporting,,,
+surveillance,,,
+surveillance,Noun,[Orbot],
+sustainability,,,
+sustainability,Noun,,
+swarm,Noun,,
+swipe,Verb,"Swipe up, swipe down [Signal]",
+switch,Noun,,
+sync,Verb,[Signal],
+synthesis,Noun,Repaso y conclusión. En plural es Síntesis también.,
+sys-firewall,Noun,,
+system log,Noun,,
+system's clock,Noun,,Systemuhr
+t-shirt,,,
+tab,Noun,,"Reiter, Tab"
+tackle ambitious projects,,,
+tag,Noun,,Schlagwort
+tag,Verb,,
+tagging attack,Conjunction,http://www.i2p2.de/how_threatmodel.html#tagging,
+tap,Verb,,
+tap to explore,Verb,,
+tarball,Noun,,
+target,Noun,,Ziel
+taskbar,Noun,,Taskleiste
+tax-deductibility,,,
+tax-deductible,,,
+tax-exempt,,,
+taxes,,,
+team,Noun,,Gruppe
+template,Noun,[Globaleaks],Vorlage
+template-based VM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which depends on a TemplateVM for its root filesystem.",
+templates,Noun,,
+terminal,Noun,,
+terms of service,Noun,,
+test bed,Noun,,Testumgebung
+tethering,Noun,[Orbot],
+text,Noun,,
+text area,Noun,,Textfeld
+text format,Noun,,
+thank-you,,,
+thanks,,,
+theme,Noun,[Signal],
+third-party,Adjective,,
+third-party service,,,
+third-party service providers,,,
+thread,Noun,"A message ""thread"" is also a ""conversation""",Unterhaltung
+threat model,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat modeling) (Source: EFF)",
+thresholds,Noun,,
+throttling,Noun,,
+thumbnail,Noun,[Signal],
+thumbs up icon,Noun,"As in the emoji called by ""(y)"" or "":thumbsup:""",Daumen-hoch-Symbol
+ticket,Noun,,
+time out,Verb,,
+timeout,Noun,[Signal],Zeitüberschreitung
+timer,Noun,"in computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). Source EFF.",
+timestamp,Noun,"[Signal] Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF)",
+timezone,Noun,,Zeitzone
+timing attack,Noun,,
+tip,Noun,[Globaleaks] [Signal],Tipp
+title,Noun,[Signal],Titel
+title bar,Noun,,
+to,Adverb,,
+to ,Adverb,,
+to stand up,,,
+toggle,Noun,,
+toggle,Verb,To switch back and forth between two options (ex: on/off) [Signal],
+token,,,
+token,Noun,,
+tool,Noun,,Werkzeug
+tool ,,,
+toolbar,Noun,[Orbot],Symbolleiste
+tools,Noun,,Werkzeuge
+torification,Noun,[Orbot],
+torify,Verb,[Orbot],
+tortification,Noun,,
+towards,,,
+track,,,
+tracker,Noun,,
+tracking,Noun,,
+trade,,,
+traffic,,,
+traffic,Noun,[Orbot],
+traffic analysis attack,Conjunction,,
+traffic analysis attack,Noun,[Orbot],
+traffic-blocking browser extension,Noun,"When you visit a website, your browser sends some information to that site's operators -- your IP address, other information about your computer, and cookies that link you to previous visits using that browser, for instance. If the website includes images and content taken from other web servers, that same information is sent to other websites as part of downloading or viewing the page. Advertising networks, analytics providers, and other data collectors may gather information from you in this way.
+You can install additional software that runs alongside your browser and will limit how much information is leaked to third-parties in this way. The most well-known examples are programs that block advertisements. EFF offers a tool called Privacy Badger which is another traffic-blocking extension.
+Source EFF.",
+trainer,Noun,,
+training,Noun,"(awareness raising session - concientización, sensibilización)",
+transparent,Adjective,,
+transport encryption,Noun,"Encrypting data as it travels across the network, so that others spying on the network cannot read it.
+Synonyms: transport-layer encryption.
+Source EFF.",
+transport layer encryption,Noun,"Encrypting data as it travels across the network, so that others spying on the network cannot read it.
+Synonyms: Transport encryption.
+Source EFF.",
+transport layer security,Noun,"The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
+Synonyms: Secure Sockets Layer (SSL).
+Source EFF.",
+trash,Noun,,Papierkorb
+trashcan icon,Noun,,Papierkorbsymbol
+tray,Noun,,
+triggered,,,
+troubleshooting,Noun,,
+trust,Noun,,Vertrauen
+trust,Verb,,
+trust on first use,Noun,"TOFU, https://en.wikipedia.org/wiki/Trust_on_first_use",
+tunnel,Noun,,
+tunnel,Verb,,
+tunneling,Adjective,,
+tunneling,Noun,,
+turn off,Verb,,Ausschalten
+turn on,Verb,,Einschalten
+tweet,Noun,,
+tweet,Verb,,
+two-factor authentication (2FA),Noun,"""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",Zwei-Faktor-Authentifizierung
+two-step verification,Noun,"""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication. (Synonyms: Two-factor authentication, multi-factor authentication) (Source EFF)",
+type,Noun,,Typ
+type,Verb,,eingeben
+unable,Adjective,[Globaleaks],
+unabled,Adjective,,
+unavailable,Adjective,[Globaleaks],nicht verfügbar
+unblock,Verb,[Signal],
+uncheck,Verb,,Abwählen
+unchoke,Verb,,
+undelete software,Noun,"Most devices let you delete data from them; For instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone. Undelete programs are applications that can be used by the device's owner, or others with access to the device, to restore some data. Undelete programs are useful for those who accidentally delete their own data, and to those whose data might have been sabotaged, such as a photographer who has been compelled to remove images from their camera. However, those same programs can be a threat to anyone who wants to permanently erase confidential data.
+Source EFF.",
+undo,Verb,,
+unexpected,Adjective,,unerwartet
+unfollow,Verb,,
+uninstall,Verb,,
+unit test,Noun,http://en.wikipedia.org/wiki/Unit_test,
+unknown,Adjective,,unbekannt
+unless,,,
+unlink,Verb,[Signal],
+unlock,Verb,,
+unlocked,Adjective,,
+unmount device,Verb,,
+"unmount, unmounting",Verb,,Aushängen
+unpack,Verb,,auspacken
+unparseable,Adjective,,
+unpin,Verb,"Unpin a tab, a site in a browser.",
+unreachable,Adjective,,unerreichbar
+unrecognized,Adjective,,
+unrecognized ,Adjective,,
+unrestricted,,,
+unsafe,Adjective,,unsicher
+untrusted,Adjective,,
+up-to-date,Adjective,,aktuell
+update,,,
+update,Noun,[Signal],Aktualisierung
+update,Verb,[Signal],aktualisieren
+updates,,,
+upgrade,Noun,[Signal],Aktualisierung
+upgrade,Verb,[Signal],
+upload,Noun,[Globaleaks] [Orbot],
+upload,Verb,[Globaleaks] [Orbot],Hochladen
+uploader,Noun,,
+uploading,Noun,,
+upstream proxy,Noun,,
+uptime,Noun,,
+user,Noun,,Benutzer
+user ID,Noun,user identification,Benutzerkennung
+user agent,Noun,,
+user data,Noun,,
+user guide,Noun,,
+user manual,Noun,,Benutzerhandbuch
+user settings,Noun,,Benutzereinstellungen
+username,,,
+username,Noun,[Globaleaks] [Orbot],Benutzername
+users,,,
+validation,,,
+variable,Noun,,
+"vcard, v-card",Noun,,vCard
+verification,Noun,[Signal],Überprüfung
+verified,Adjective,[Signal],überprüft
+verify,Verb,[Signal],
+version,Noun,[Signal],
+version,Verb,Create a new version of a record or file while still maintaining past versions of the file.,
+versioned,Adjective,,
+video chat,Noun,,
+view,Noun,,Ansicht
+view,Verb,,anzeigen
+viewport,Noun,,
+volume,Noun,,Datenträger
+volunteer,Noun,,
+volunteers,,,
+vulnerability,Noun,,
+vulnerable,Adjective,,
+wallet,Noun,,Geldtasche
+warning,Noun,,Achtung
+watch,Verb,,überwachen
+watch list,Noun,,Beobachtungsliste
+watching,,,
+watermark,Noun,,Wasserzeichen
+wear leveling,Noun,"Some forms of digital storage, like the flash memory used in solid-state drives (SSD) and USB sticks, can wear out if overwritten many times. Wear leveling is a method that spreads the writing of data evenly across all of the media to prevent one part of it being overwritten too many times. Its benefit is that it can make devices last longer. The danger for security-conscious users is that wear leveling interferes with secure erase programs, which deliberately try to overwrite sensitive files with junk data in order to permanently erase them. Rather than trusting secure erase programs with files stored on SSD or USB flash drives, it can be better to use full-disk encryption. Encryption avoids the difficulty of secure erasing by making any file on the drive difficult to recover without the correct passphrase.
+Source EFF.",
+web,Noun,,
+web browser,Noun,[Orbot],
+web connectivity,Noun,,
+"web connectivity, connectivity",Noun,[Orbot],
+web interface,Noun,,Weboberfläche
+webmail provider,Noun,,
+webserver,Noun,,
+website,,,
+website,Noun,,Webseite
+week,Noun,,
+which,,,
+whistleblower,Noun,[Globaleaks],Hinweisgeber
+whistleblowing,Noun,[Globaleaks],Hinweisgeben
+whitelist,Noun,,
+whole device,Noun,As in “whole device encryption.”,
+wildcards,Noun,,
+window,Noun,,
+wipe,Verb,,
+wizard / assistant,Noun,A “getting started” wizard / assitant,Assistent
+work,,,
+work,Verb,,
+work-around,Noun,,
+works,,,
+world wide web,Noun,,
+world-leading,,,
+wrapper,Noun,,
+x,Noun,,
+year,Noun,,
+yes,Noun,,
+you,,,du (deutsch)
+zero day,Noun,"A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers hear of the flaw and fix it, attackers can use it for their own purposes.
+Source EFF.",
+zip,Verb,To compress a file or directory so that is is smaller in size. [Signal],
+βασικό,,,
+βασικό,Adjective,,
+εγκαθιστώ,Verb,,
+…,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",
diff --git a/glossary_es.csv b/glossary_es.csv
new file mode 100644
index 0000000..1cddf9f
--- /dev/null
+++ b/glossary_es.csv
@@ -0,0 +1,2186 @@
+term,pos,comment,translation_es,comment_es
+ donation process,,,,
+ testing,,,,
+ third-party,,,,
+!,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",!,
+"""",Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex","""",
+$,,,,
+%s,Conjunction,Do not translate or change. This is a placeholder (ex: 2%s or 1%s),,
+ ,Conjunction,"&_nbsp_; [without underscores, Non-Breaking Space]",,
+...,,,,
+24/7,Noun,"Twenty-four hours, seven days a week. This essentially means ""all the time"" (non stop). Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running.",24/7,
+2FA,Noun,"Two-factor authentication
+Two-factor authentication
+""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",,
+3D bar chart,Noun,[Martus],Gráfico de barras 3D,
+3rd party,Adjective,[Signal] As in “Use a 3rd party application.”,,
+:,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",:,
+;,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",;,
+?,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",?,
+A reasonably secure operating system,Noun,[Qubes OS] This is the Qubes OS tagline.,Un sistema operativo razonablemente seguro,
+A security-oriented operating system,Noun,[Qubes OS],Un sistema operativo enfocado en la seguridad,
+ADIDS,Noun,what is that?,ADIPS,
+API,Noun,"Application Programming Interface: ""In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software."" - Wikipedia",API,"Interfaz de programación de aplicaciones
+""La interfaz de programación de aplicaciones, abreviada como API del inglés: Application Programming Interface, es un conjunto de subrutinas, funciones y procedimientos (o métodos, en la programación orientada a objetos) que ofrece cierta biblioteca para ser utilizado por otro software como una capa de abstracción."" - Wikipedia"
+APK,Noun,"""Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10."" https://en.wikipedia.org/wiki/Android_application_package",APK,"""Un archivo con extensión .apk (Android Application Package, significado en español: Aplicación empaquetada de Android) es un paquete para el sistema operativo Android."" - Wikipedia"
+About,Noun,,,
+Alice,,[Briar],,
+American Apparel,,,,
+Android,Noun,[Signal] [Orbot] Operating system,Android,Sistema operativo
+Anti Evil Maid,Noun,[Qubes OS] Do not translate. Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. (Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html),,
+App Store,Noun,Apple App Store [Signal],,
+AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended for running software applications.",AppVM,Ver TemplateVM
+Apt.,,,,
+Ativistas,,,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],,
+Autonomous System number,Noun,,Número de sistema autónomo,
+BCC,Noun,"""Blind carbon copy""",CCO; BCC,"""Copia de carbón oculta"""
+Back,Adverb,,,
+Back to,,,,
+Backup Key File,Noun,[Martus] Also: key backup,Copia de seguridad de par de claves,
+Benetech,Noun,Company name which should not be translated or transcribed.,,
+BitTorrent,,,,
+Bitcoin,,,,
+Blow the Whistle,Noun,[Globaleaks],,
+Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,,
+Bob,,[Briar],,
+Bug,,,,
+C&C,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+C2,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+CFC program,,,,
+CIDR,Noun,Classless inter-domain routing,,
+CPU,Noun,,,
+CSR,Noun,Certificate Signing Request,,
+CSRF,Noun,,,
+CVC,,,,
+Cancel,Verb,,,
+Card Number,,,,
+Carol,,[Briar],,
+Certificate Signing Request,Noun,,,
+ChatSecure,Noun,Application Name,,
+Chrome App,Noun,[Signal],,
+Chrome OS,Noun,,,
+Chrome Web Store,Noun,,,
+Circuit Display,Noun,[Tor],,
+Clear,Noun,,,
+Clearnet,Noun,,,
+Client User Interface,Noun,,Interfaz de usuario de cliente,
+ClockVM,Noun,,,
+Combined Federal Campaign,,,,
+Command-line tool,Noun,"The ""command line"" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar ""icons and buttons"" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the resp
 onses don't match your expectations.
+Source EFF.",,
+Comments,,,,
+Commit,Noun,,,
+Commit,Verb,,cometer,
+Company,,,,
+Contributions,,,,
+Contributors,Noun,,,
+Core,,,,
+Courier,Noun,"App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (كوريور)",,
+"Credit Card, credit card",,,,
+Cross-site scripting,Noun,,,
+Crowdfunding,,,,
+Crypto,Adjective,,,
+Crypto,Noun,This is an abbreviation of “cryptography.”,,
+Customization Template Files (*.mct),Noun,[Martus],Archivos de plantillas de personalización (*.mct),
+DD,Noun,,,
+DDoS,Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
+Synonyms: distributed denial of service
+Source EFF",,
+DDoS (distributed denial of service),Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)",,
+DHT,Noun,,,
+DNS,Noun,[Orbot],DNS,
+DNS record,Noun,,,
+DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates.",DVM,
+DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,Plantilla de Máquina Virtual Desechable (DVM),
+Darknet,Noun,,,
+Data Retention Strategy,Noun,,,
+Data Source Grid,Noun,,,
+Data-Driven Dropdown (Field),Noun,[Matus],,
+Date,Noun,,,
+Debian-based Linux,Noun,[Signal],,
+Deflect,Noun,Don't translate this,,
+Desktop Client,Noun,,Cliente de escritorio,
+Device Management,Noun,,,
+Devtools,Noun,,,
+Disconnect ,,Disconnect search service,,
+DispVM,Noun,"[QubesOS] ""Disposable Virtual Machine""A temporary AppVM based on a DVM Template which can quickly be created, used, and destroyed.",DispVM,"El termino es Máquina Virtual Desechable pero se acuerda manetener el termino tal cual ya que es un termino usado en multiples secciones de la documedntacion. Michael comenta que upstream se busca hacer desaparecer DispVM y que diga Disposable VM, esta es una herencia"
+Distributed,Verb,,,
+Distribution,Noun,,,
+Divice Management,Noun,,,
+Dom0,Noun,"[QubesOS] ""Domain Zero"" Also known as the **host** domain, dom0 is the initial VM started by the Xen hypervisor on boot.",Dom0,"Se acuerda que no requiere traducción cuando esta abreviado, y se puede utilizar ""Dominio Cero"" cuando se explica."
+DomU,Noun,"[QubesOS] ""Unprivileged Domain""Also known as **guest** domains, domUs are the counterparts to dom0.",DomU,
+Donate,,,,
+Donate Page,,,,
+Donor (n),Noun,,,
+Double-check,Verb,[Signal],,
+Download,Verb,,,
+Downloading,,,,
+Downloads,Noun,,,
+Drag and Drop,Noun,,,
+Drawer,Noun,"A UI design pattern that consist on a lateral, hidden menu that can be brought into view usually by tapping an ""hamburguer"" icon or swiping from the left.",panel,
+DuckDuckGo,Noun,Name of an open source search engine.,,
+Dump,Noun,,,
+Dump,Verb,,,
+EPUB Reader,Noun,,,
+Eavesdropping,Noun,,,
+Edge,Noun,,,
+Edge server,Noun,,,
+Email Subject,Noun,[Globaleaks],,
+Encrypted,Verb,[Globaleaks],cifrada,
+Ensure,Verb,,asegurar,
+Enter,,,,
+Event,Noun,,evento,
+External drive,Noun,,unidad de disco extorno,
+Extra text,Noun,,,
+FAI satellite,Noun,,,
+FAQ,Noun,[Orbot] “Frequently Asked Questions”,preguntas más frecuentes,
+FOSS,Noun,Free and open-source software,,FOSS
+FTP (File Transfer Protocol),Noun,"An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
+Synonyms: FTP server, File Transfer Protocol. (Source: EFF)",,
+FTP server,Noun,"An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer Protocol) (Source EFF)",,
+Face ID,Noun,[Signal] Specific to iOS,,
+Fallback,Adjective,[Globaleaks],,
+Fallback,Noun,[Orbot] [Globaleaks],para contingencias,"""Un plan de contingencias es un instrumento de gestión para el manejo de las Tecnologías de la Información y las Comunicaciones en el dominio del soporte y el desempeño (delivery and support, véase ITIL).
+
+Dicho plan contiene las medidas técnicas, humanas y organizativas necesarias para garantizar la continuidad del negocio y las operaciones de una compañía u organización."" (Fuente: https://es.wikipedia.org/wiki/Plan_de_contingencias)"
+Favicon,Noun,"A favicon, also known as a shortcut icon, website icon, tab icon, URL icon, or bookmark icon, is a file containing one or more small icons, associated with a particular website or web page.",,
+Feedback,Noun,,,
+File fingerprint,Noun,"A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
+Synonyms: file hash value.
+Source EFF.",,
+File hash value,Noun,"A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
+Synonyms: File fingerprint.
+Source EFF.",,
+File system,Noun,"Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.
+Source EFF.",,
+Firefox,Noun,,,
+Firewall,Noun,"A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways. (Source: EFF)",,
+FirewallVM,Noun,"[Qubes] ""Firewall Virtual Machine""A type of ProxyVM which is used to enforce network-level policies (a.k.a. ""firewall rules"").",FirewallVM,Ver TemplateVM
+Firewalled,Adjective,,,
+Firmware,Noun,,,
+Fit,,,,
+Folder Options,Noun,,Opciones de folder,
+Form,Noun,,Formulario,
+Form 990,,,,
+Forward Secrecy,Noun,"A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For  messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
+Synonyms: Perfect forward secrecy.
+Source EFF.",,
+Frequently Asked Questions,Noun,“FAQ”,Preguntas Frecuentes,
+Full disk encryption,Noun,"If you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.
+Source EFF.",,
+Fully Qualified Domain Name,Noun,See https://en.wikipedia.org/wiki/Fully_qualified_domain_name,,
+Functionality,Noun,,funcionalidad,
+GC,Noun,Garbage collector,,
+GDPR,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",,
+GFW,Noun,,,
+GIF,Noun,Graphics Interchange Format [Signal],GIF,
+GNU General Public License,Noun,,,
+GPG,Noun,"""Gnu Privacy Guard"" GPG is a free software that implements OpenPGP specification",GPG,
+Garbage data,Noun,,datos de basura,
+Garlic,Noun,https://en.wikipedia.org/wiki/Garlic_routing,ajo,
+Garlic routing,Noun,https://en.wikipedia.org/wiki/Garlic_routing,,
+General Data Protection Regulation,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",,
+Get,,,,
+Get Access Mode,Noun,[Lantern],,
+GetTor,Noun,[Orbot] [Tor],GetTor,
+Getting Started,Noun,,,
+Ghost,Noun,"[Peerio] ""Ghost"" is used as a proper noun in Peerio for a feature that allows users to send messages and files to a non-Peerio user via email or URL. This URL can be accessed with a secret passphrase and decrypted in the browser.
+
+""I sent you a (Peerio) Ghost""",,
+Giant Rabbit,,,,
+Give Access Mode,Noun,[Lantern],,
+GlobaLeaks,Noun,[Globaleaks] Name of application. Do not translate.,,
+Glossary,Noun,,,
+Go Back,Verb,,atras,
+Google,Verb,Company Name (Reference Google.com for appropriate transcription if applicable),,
+Google Captcha,Noun,,,
+Google Chrome,Noun,,,
+Google Drive,Noun,,,
+Google Play Store,Noun,[Signal],,
+Got Skills,,,,
+Graceful Shutdown,Noun,[I2P],,
+Gracefully,Adverb,,,
+Graph,Noun,,,
+Graph,Verb,,,
+Great Firewall of China,Noun,,,
+Grid,Noun,,tabla,
+Guardian Project,Noun,,,
+HQ,Noun,,,
+HRD,Noun,Human Rights Defence,,
+HTTP,Noun,"[Orbot] ""The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web."" - Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol)",HTTP (Protocolo de transferencia de hipertexto),"""El Protocolo de transferencia de hipertexto (en inglés: Hypertext Transfer Protocol o HTTP) es el protocolo de comunicación que permite las transferencias de información en la World Wide Web."" (Fuente: https://es.wikipedia.org/wiki/Protocolo_de_transferencia_de_hipertexto)"
+HTTP Header Field Manipulation,Noun,,,
+HTTP Invalid Request Line,Noun,,,
+HTTPS,Noun,"""HTTPS (also called HTTP over Transport Layer Security [TLS], HTTP over SSL, and HTTP Secure) is a communications protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data."" - Wikipedia (https://en.wikipedia.org/wiki/HTTPS)",,
+HTTPS Everywhere,Noun,,HTTPS en todos lados,
+HTTPS certificate,Noun,,Certificación HTTPS,
+HVM,Noun,"[Qubes] ""Hardware Virtual Machine""Any fully virtualized, or hardware-assisted, VM utilizing the virtualization extensions of the host CPU.",HVM,La traduccion es Máquina virtual de hardware pero se acuerda usar el acronimo
+Hardcoded,Verb,,,
+Hardware,Noun,,,
+Headline,Noun,,titular,
+Heart of Internet Freedom,,,,
+Heart of Internet Freedom T-Shirt,,,,
+Heartbeat,Noun,,pulsación,
+Help,Noun,[Orbot],Ayuda,
+Hidden,Adjective,,oculto,
+Hidden Service,Noun,[Orbot],servicio oculto,
+Homepage,Noun,[Globaleaks],página de Inicio,
+Hop,Noun,,,
+Hosting provider,Noun,,,
+Hotspot,Noun,,,
+Housekeeping,Noun,,,
+I/O,Noun,Input/ouput,,
+I2P,Noun,[I2P] Name of application. Do not translate.,,
+ID,Noun,[Mailvelope],,
+IDE,Noun,,,
+IMAP settings,Noun,"IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.
+Source EFF.",,
+IP address,Noun,"[Orbot] A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. (Source EFF)",Dirección IP,"Un dispositivo en la red de internet necesita su propia dirección para recibir data, de la misma manera que una casa o un negocio necesita su propia dirección para recibir su correspondencia físicas. Esta dirección es su Dirección IP (Internet Protocol/ Protocolo Internet). Cuando usted se c
 onecta a un sitio web u otro servidor en la linea, usualmente revela su dirección IP. Esto no revela, necesariamente, su identidad (es muy difícil hacer un mapa de las direcciones IP para conocer las direcciónes reales o una computadora en particular). Una dirección IP puede dar cierta información sobre ti, y esta sería de forma general como la localidad o nombre de tu Proveedor de Servicios de Internet. Servicios como Tor permiten que  escondas tu dirección IP, lo cual te ayuda a tener anonimato en la linea."
+IP addresses,Noun,,,
+ISP (Internet Service Provider),Noun,ISP,"ISP, proveedor de servicios de Internet",El proveedor de servicios de Internet
+Immediate,Adjective,,,
+Implement,Verb,,implementar,
+Inbound,Adjective,,,
+Include Private Data,Verb,,,
+Indicators of compromise,Noun,"Clues that show that your device may have been broken into or tampered with.
+Source EFF.",,
+Intermediate Certificate,Noun,,,
+Internal storage,Noun,"Non volatile memory used in devices, mobile or else.",,
+Internet,Noun,[Signal],internet,
+Internet filtering,Noun,Filtering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF),,
+Introduce,Verb,,,
+Introducer,Noun,,,
+Introduction,Noun,,presentación,
+Invalid,,,,
+Item,Noun,,,
+JRE,Noun,Synonym: Java Runtime Environment,,
+JS,Noun,,,
+Java Runtime Environment,Noun,Synonyme : JRE,,
+Javascript,,,,
+Javascript,Noun,,,
+Join,Verb,,,
+Journalists,,,,
+KB,Noun,[Orbot] kilobyte,KB,
+KB/s,Noun,,,
+"KB/s, Kbps",Noun,,,
+KBps,Noun,,,
+"Kbps, KB/s",Noun,[Orbot] kilobytes per second,"Kbps, KB/s",kilobit por segundo
+Key Backup,Noun,[Martus],Copia de seguridad de clave,
+Key Exchange,Noun,,,
+Key fingerprint,Noun,"A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.
+Source EFF.",,
+Key verification,Noun,"In public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.
+Source EFF.",,
+Key-signing party,Noun,"When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others ""I believe this key belongs to this person -- and if you trust me, you should believe that too."" Telling the world that you trust someone's key is called ""signing their key"": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to other friends.
+Synonyms: cryptoparty.
+Source EFF.",,
+Keyboard,Noun,[Signal],Teclado,
+Keyboard Layout,Noun,,Plano de teclado,
+Keylogger,Noun,"A malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The ""key"" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.
+Source EFF.",,
+Language pack,Noun,,Paquete de idioma,
+Lantern,Noun,[Lantern] Application Name (https://getlantern.org),,
+Lantern Cloud Server,Noun,[Lantern] “Lantern” is the name of an application. (https://getlantern.org),,
+Last Name,,,,
+Launcher,Noun,,,
+Leak,Noun,Synonym: data leakage,,
+Lease,Noun,,,
+Leaseset,Noun,,,
+Let's Encrypt,Noun,Don't translate this. For more info see https://en.wikipedia.org/wiki/Let%27s_Encrypt,,
+License Agreement,Noun,[Globaleaks],,
+Linked Identity,Noun,,,
+List,Noun,,,
+Listen,Verb,,,
+Live CD,Noun,,,
+Live ISO,Noun,,,
+Live OS,Noun,,,
+Live System,Noun,,,
+Live USB,Noun,,,
+Login page,Noun,,,
+MB,Noun,[Orbot] megabyte,MB,
+MBR,Noun,,,
+MIME,Noun,[Signal],MIME,"Multipurpose Internet Mail Extensions o MIME (en español ""extensiones multipropósito de correo de internet"") son una serie de convenciones o especificaciones dirigidas al intercambio a través de Internet de todo tipo de archivos (texto, audio, vídeo, etc.) de forma transparente para el usuario."
+MISP (Malware Information Sharing Platform),Noun,"[SES] ""The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.
+A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information."" -http://www.misp-project.org/",,
+MITM,Noun,"Suppose you believe you were speaking to your friend, Bahram, via encrypted  messenger. To check it's really him, you ask him to tell you the city where you first met. ""Istanbul"" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to de
 fend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
+Synonyms: Man-in-the-middle attack.
+Source EFF.",,
+MM,Noun,,,
+MMS,Noun,“Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service [Signal],MMS,
+MMSC,Noun,Multimedia Messaging Service Center. A mobile network operator's store and forward server for relaying MMS (Multimedia Messaging Service) messages. [Signal],MMSC,
+Magic Word,Noun,,Palabra mágica,
+Mail routes,Noun,,,
+Maintainer,Noun,,,
+Malformed,Adjective,,,
+Malicious,Adjective,,malicioso,
+Malicious software,Noun,"Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
+Synonyms: Malware.
+Source EFF.",,
+Malware,Noun,"Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
+Synonyms: Malicious software
+Source EFF.",,
+Man-in-the-middle attack,Noun,"Suppose you believe you were speaking to your friend, Bahram, via encrypted  messenger. To check it's really him, you ask him to tell you the city where you first met. ""Istanbul"" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications 
 software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
+Synonyms: MITM
+Source EFF.",,
+Manage Contacts,Noun,[Martus] Martus menu option.,Administrar contactos,
+Martus Desktop,Noun,[Martus],Martus de escritorio,
+Martus Desktop Application,Noun,[Martus],Aplicación de escritorio de Martus,
+Martus Information Management and Data Collection Framework,Noun,[Martus],Modelo Martus de Recogida de Datos y Gestión de la Información,
+Martus Record Archive (*mba),Noun,[Martus],Archivo de expediente de Martus (*.mba),
+Martus Report Format (.mrf),Noun,[Martus],,
+Martus Search Specification,Noun,[Martus],,
+"Master Boot Record, MBR",Noun,,,
+Master password,Noun,"A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.
+Source EFF.",,
+Match,,,,
+Matching,Adjective,[Globaleaks],,
+Matching Conditions,,,,
+Megabytes,Noun,[Globaleaks],,
+Message Format,Noun,,Formato de Mensaje,
+Message Of The Day,Noun,,,
+Mixnet,Noun,,,
+Mobile Martus,Noun,[Martus],Martus Móvil,
+Multihome,Noun,,,
+Multihoming,Noun,,,
+My Computer,Noun,The user’s home folder in some operating systems.,,
+NAT,Noun,Network Address Translation,,
+NGO,Noun,Non-Governmental Organization,,
+NGOs,,,,
+NSA,,,,
+Name,Noun,,,
+Naming service,Noun,,,
+Navegador Tor,Noun,,,
+NetDB,Noun,network database,,
+NetVM,Noun,"""Network Virtual Machine""A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM.",NetVM,Ver TemplateVM
+Network database,Noun,,,
+Network drive,Noun,,,
+New,Adjective,,,
+Newsletter,Noun,,,
+Next,Noun,“Next” button,siguiente,(Sinónimo: próximo)
+No,Noun,,,
+Node,Noun,,nodo,
+Non-Tor,Noun,,,
+Notes,,,,
+OK,Noun,[Signal] “OK” button which can also be translated as “Accept”,aceptar,
+OPML,Noun,"Outline Processor Markup Language
+
+""OPML (Outline Processor Markup Language) is an XML format for outlines (defined as ""a tree, where each node contains a set of named attributes with string values""). Originally developed by UserLand as a native file format for the outliner application in its Radio UserLand product, it has since been adopted for other uses, the most common being to exchange lists of web feeds between web feed aggregators.""
+- https://en.wikipedia.org/wiki/Opml",,
+OS,Noun,Operating system,,
+OTR,Noun,Off The Record,,
+Observatory,Noun,,observatorio,
+Off,Adjective,,,
+Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for  messaging conversations. (Synonyms : OTR) (Source EFF)",fuera de registro,"lka mensajería instantánea muchas veces no está cifraas. “Fuera de Registro,” o “OTR” por sus siglos en inglés, es una manera de agregarle cifrado; de esa manera  puedes seguir utilizando redes de comunicaciones familiares como Facebook chat, o Google Chat o Hangouts pero con tus mensajes mas resistentes al espionaje."
+Oil pipeline,Noun,,,
+On,Adjective,,,
+One-time password,Noun,"Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
+Source EFF.",,
+Onion,Noun,[Tor],cebolla,
+Onion Address,Noun,[Tor],,
+Onion Browser,Noun,[Tor],,
+Onion Circuits,Noun,[Tor],,
+Onion routing,Noun,[Tor],,
+Open Observatory of Network Interference,,,,
+Open Observatory of Network Interference (OONI) ,,,,
+Open Observvatory of Network Interference (OONI),,,,
+Open Source,,,,
+Open Whisper Systems,Noun,Organization name. Do not translate. [Signal],Open Whisper Systems,
+Open-source software,Noun,"Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software,"" it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.
+Synonyms: FLOSS, free, libre and open-source software, free software
+Source EFF.",,
+OpenPGP,Noun,OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy),OpenPGP,
+OpenPGP key,Noun,,clave OpenPGP,
+Operating System (OS),Noun,"A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems. (Source: EFF)(Synonym: OS) [Signal]",sistema operativo,
+Optional Setup,Noun,,,
+Orbot,Noun,[Orbot] Name of application. Do not translate.,Orbot,
+Oudated,Adjective,,,
+Out-of-band verification,Noun,"""Out-of-band"" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.
+Synonyms: out-of-band
+Source EFF.",,
+Outdated,Adjective,,,
+Overhead,Noun,,,
+Overlay network,Noun,,,
+Overview,Noun,[Globaleaks],,
+P.O. Box,Noun,,,
+PDF,Noun,,,
+PGP,Noun,"""Pretty Good Privacy"" PGP is a commercial software for cyphering",PGP,"(La controversia sobre PGP o GPG es universal, y generalmente un término utiliza el otro para definirse, por lo que no hay una propuesta concreta)."
+PIN,Noun,Personal Identification Number [Signal],NPI,Número Personal de Identificación
+PV,Noun,"[QubesOS] ""Paravirtualization""An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.",PV,Se utiliza paravirtualización
+PVHVM,Noun,"[QubesOS] ""Paravirtualization on Hardware Virtual Machine""To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers).",PVHVM,
+Padding,Noun,,,
+Page Report,Noun,Type of report generated by Martus - not one page of a report.,Reporte de página,
+Pane,Noun,,,
+Panic,Noun,"Panic button, panic app",,
+Passive adversary,Noun,"A passive adversary is one that can listen to your communications, but cannot directly tamper with them.
+Source EFF.",,
+Passphrase,Noun,,,
+Password manager,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
+Synonyms: Secure password database; password safe.
+Source EFF.",,
+Password safe,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
+Synonyms: Secure password database, Password manager.
+Source EFF.",,
+Passwords field,Noun,,,
+Passwords field ,Noun,,,
+Peer-to-Peer (P2P),Adjective,,,
+Perfect forward secrecy,Noun,"A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For  messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
+Synonyms: Forward secrecy.
+Source EFF.",,
+Permalink,Noun,,,
+Persistence wizard,Noun,,,
+Persistent Storage,Noun,,,
+Personal information,Noun,,,
+Photo story,Noun,,,
+Phrases,Noun,,,
+Pie Chart,Noun,[Martus],Gráfico circular,
+Piece,Noun,,,
+Plaintext,Noun,[Globaleaks] [Signal],,
+Plan,Noun,,,
+Plans,Noun,,,
+Platform,Noun,[Globaleaks],,
+Please,Adverb,,Por favor,
+Pledge,,,,
+Pluggable Transport,Noun,,,
+Pluggable Transports Bundle,Noun,,,
+Policy,Verb,,,
+Pool,Noun,,,
+Post,Noun,,,
+Post,Verb,,,
+Post-traumatic stress,Noun,,,
+Posted,Verb,,,
+Power Off,Verb,,apagar,
+Powering,,,,
+Powering Digital Resistance,,,,
+Powering Digital Resisteance,,,,
+Preparation,Noun,,,
+Pretty Good Privacy,Noun,"PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
+PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. (Synonyms: PGP) (Source: EFF)",,
+Primary,Noun,,primario,
+Procedure,,,,
+Proceed,Verb,,proceder,
+Projects,Noun,,,
+Promote,,,,
+Protect,,,,
+Protocol,Noun,"A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called ""http"". Some protocols use encryption to protect their contents. The secure version of the http protocol is called ""https"". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging.
+Source EFF.",,
+Province,Adjective,,,
+Province,Noun,,estado,
+ProxyVM,Noun,"[QubesOS] ""Proxy Virtual Machine""A type of VM which proxies network access for other VMs",ProxyVM,Ver TemplateVM
+Pseudonym,Noun,"A name that you choose to use in some context (like an online forum) and that others may come to recognize, but that isn’t connected to names that people know you by in your day-to-day life.
+Source EFF.",,
+PsiCash,Noun,[Psiphon],,
+Psiphon,Noun,"Name of an organization and application. Please do not translate this term. If needed, you can transcribe the organization / tool name. For example, the name is transcribed in Arabic, Persian and Amharic.",,
+Public Information File (*.mpi),Noun,[Martus] Files containing the account's public information,Archivo de información pública (*.mpi),
+Public key cryptography,Noun,,,
+Public key encryption,Noun,"Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password ""bluetonicmonster"", you would need both the file and the secret ""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the ""public key"": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Asymmetric key encryption, Public key cryptography.
+Source EFF.",,
+Public key servers,Noun,"If you plan to send a secure message to someone who uses public key cryptography like PGP, you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such keys, allowing software to use an email address, name, or key fingerprint to search for a full key and download it. There are many PGP public key servers, but they usually share their key collections with each other. Keyservers can't verify whether the keys they publish are genuine or forgeries. Anyone can upload a key to a public key server—in anyone's name. That means that a key connected to a person's name or email on a keyserver might not be their real key. In order to check the authenticity of a key, you need to check its signatures, or confirm its fingerprint with the original user in a trustworthy way.
+
+PGP allows you to sign other people's keys, which is a way of using your own key to assert that a certain key is the right one to use to contact another person. This is meant to provide a way of distinguishing between genuine and fake keys; if people sign the right keys for people they know and communicate with, others can use those signatures to confirm that the genuine keys are genuine. When you download a key from a key server, it may include signatures from other people who affirm that it's the right one. If you know those people and know that you have the right key for them, you can have more confidence in the newly downloaded key. This verification process is also called the web of trust. Its advantage is that it's decentralized and not controlled by any authority, so you don't have to believe a certain company or government about which keys to use when writing to new people. Instead, you can believe your own social networks. One important disadvantage of the web of trust is t
 hat publishing signatures for other people's keys tells the whole world who your contacts are; it creates public evidence that you know particular people. Also, using the web of trust correctly requires a good deal of time and attention, and some communities rarely or never participate. (Source: EFF)",,
+Q&A,Noun,,,
+QR Code,,,,
+QR code,Noun,[Signal] [Orbot],código QR,
+"QR code, code",Noun,[Signal],código QR,
+Qubes Global Settings,Noun,[QubesOS],,
+Qubes OS,Noun,"[QubesOS] Do not translate ""Qubes OS""",Qubes OS,"As it is the product name, it remains untranslated."
+Query,Noun,,,
+Questionnaire,,,,
+RAM,Noun,,,
+RMI,Noun,,,
+ROM,Noun,[Signal],ROM (Memoria de solo lectura),
+Randomization,Noun,,,
+Rate,Noun,,,
+Read,Verb,,,
+ReadMe,Noun,The ReadMe file included with any new software release that describes changes to software,Leeme,
+Reboot,Noun,,reiniciar,
+Reboot,Verb,,,
+Record ID,Noun,,Identificación del expediente,
+Reference Guide,Noun,,Guía de referencia,
+Referer,Noun,,,
+Referer spoofing,Noun,,,
+Refresh,Noun,,,
+Refresh,Verb,,,
+Registration Lock,Noun,[Signal],bloqueo de registro,
+Reject,Verb,,rechazar,
+Release key,Noun,,,
+Removable media,Noun,,,
+Removable media drive,Noun,,,
+Repliable datagram,Noun,,,
+Required,Adjective,,,
+Reseed,Verb,,,
+Retry,Verb,,,
+Retweet,Noun,,,
+Retweet,Verb,,,
+Reusable Choice,Noun,,,
+Revocation certificate,Noun,"What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.
+Source EFF.",,
+Reward,Noun,,,
+Rich Text,Noun,,,
+Ring Tone,Noun,,,
+Rip,Noun,,,
+Risk analysis,Noun,"In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
+Synonyms: Risk, Risk Assessment.
+Source EFF.",,
+Risk assessment,Noun,"In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
+Synonyms: Risk, Risk analysis.
+Source EFF.",,
+Roadmap,Noun,,,
+Role-based access control,Noun,[Globaleaks],,
+Root,Noun,,,
+RouterInfo,Noun,,,
+Ruleset Tests,Noun,,,
+Running environment,Noun,,,
+Runtime,Noun,,,
+SD card,Noun,,,
+SES (Suspicious Email Submitter),Noun,[SES] Project Name. Please do not translate.,,
+SIM card,Noun,"A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.
+Source EFF.",,
+SMS,Noun,"“SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.[1] It uses standardized communication protocols to enable mobile devices to exchange short text messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal]",SMS,
+SMTP,Noun,[Globaleaks],,
+SOCKS,Noun,"[Orbot] ""Socket Secure (SOCKS) is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded."" - Wikipedia (https://en.wikipedia.org/wiki/SOCKS)",SOCKS,"""SOCKS es un protocolo de Internet que permite a las aplicaciones Cliente-servidor usar de manera transparente los servicios de un firewall de red. SOCKS es una abreviación de ""SOCKetS""."" (Fuente: https://es.wikipedia.org/wiki/SOCKS)"
+SSD (Solid-State Drive),Noun,"""A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently."" -https://en.wikipedia.org/wiki/Solid-state_drive
+
+""Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.""
+Source EFF","SSD (unidad de estado sólido, dispositivo de estado sólido)","""La unidad de estado sólido, dispositivo de estado sólido o SSD...es un tipo de dispositivo de almacenamiento de datos que utiliza memoria no volátil, como la memoria flash, para almacenar datos, en lugar de los platos o discos magnéticos de las unidades de discos duros (HDD) convencionales."" -https://es.wikipedia.org/wiki/Unidad_de_estado_s%C3%B3lido"
+SSH,Noun,"""Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users."" - Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell)",,
+SSL,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as ""SSL"", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers."" - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security)",,
+SSL Observatory,Noun,,,
+SVM,Noun,Support Vector Machine,,
+SVM (Support Vector Machine),Noun,"""In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis."" - https://en.wikipedia.org/wiki/Support_vector_machine",,
+Safe-house,Noun,,,
+Satellite Provider,Noun,,,
+Screen Lock,Noun,[Signal],bloqueo de pantalla,
+Search,Noun,,,
+Search Engine,Noun,,,
+Search Results,Noun,Application menu item.,Resultados de la búsqueda,
+Secure Sockets Layer,Noun,,,
+Secure Sockets Layer (SSL),Noun,"The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL). (Synonyms: Transport layer security) (Source: EFF)",,
+Secure password database,Noun,"A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them. (Synonyms: Password manager, password safe) (Source EFF)",,
+Security certificate,Noun,"A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
+(Synonyms: Digital certificate) (Source EFF)",,
+Security question,Noun,"To supplement passwords, some systems use ""security questions."" These are queries to which only you are supposed to know the answer. The problem with security questions is that they are really just extra passwords that have potentially guessable or discoverable answers. We recommend you treat them as any other password: create a long, novel, random, phrase to answer them, and record that somewhere safe. So the next time your bank asks you your mother's maiden name, you should be ready to answer ""Correct Battery Horse Staple"" or similar.(Source EFF)",,
+Security token,Noun,,Token de Seguridad,
+Seed,Noun,,,
+Seeding,Noun,,,
+Select,,,,
+Select Fit,,,,
+Sensitive,Adjective,,,
+Sensor,,,,
+Server,,,,
+Servers,Verb,,,
+ServiceVM,Noun,"""Service Virtual Machine""A VM the primary purpose of which is to provide a service or services to other VMs.",ServiceVM,El termino es Máquina Virtual de Servicio pero se acuerda manetener el termino tal cual ya que es un termino usado en multiples secciones de la documedntacion.
+Setting,Noun,,Configuración,
+Settings,Noun,[Signal] [Orbot] Application menu item.,configuraciones,
+Short User Manual,Noun,,,
+Signal,Noun,[Signal] Name of application. Do not translate.,Signal,
+Size,,,,
+Slim,,,,
+Socket,Noun,,,
+Software,Noun,,,
+Solid State Drive,Noun,"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.
+Synonyms: SSD.
+Source EFF.",,
+Source code,Noun,,,
+Speed Boost,Noun,[Psiphon],,
+Standalone(VM),Noun,"[QubesOS] ""Standalone (Virtual Machine)""In general terms, a VM is described as **standalone** if and only if it does not depend on any other VM for its root filesystem.",maquina virtual independiente,"Igual que TemplateBasedVM, puede traducirse"
+StandaloneHVM,Noun,"[QubesOS] ""Standalone Hardware Virtual Machine""Any HVM which is standalone (i.e., does not depend on any other VM for its root filesystem).",Máquina virtual de hardware (HVM) independiente,
+Standard Fields,Noun,,,
+Sticker Pack,,,,
+Stock,,,,
+Stocks,,,,
+Street Address,,,,
+Subtitle,Noun,[Globaleaks],,
+Summary,Noun,,,
+Support,,,,
+Support Vector Machine,Noun,,,
+Sure,,,,
+Surname,Noun,,,
+Sweatshirt,,,,
+Sync Manager,Noun,,Administrador de sincronización,
+Sys admin,Noun,,,
+System administrator,Noun,,,
+TLS,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as ""SSL"", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers."" - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security)",,
+TOFU,Noun,"Trust on first use:
+https://en.wikipedia.org/wiki/Trust_on_first_use",,
+TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",,
+TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",orden TRIM,"""En informática, una orden TRIM permite a un sistema operativo comunicar a una unidad de estado sólido (SSD) qué bloques de datos ya no están en uso, como los datos dejados al borrar ficheros. Una operación del SO como un borrado generalmente sólo marca los bloques implicados como no usados. TRIM permite que el SO pase esa información al controlador de la SSD, que de otra manera no sabría qué bloques puede eliminar."" - https://es.wikipedia.org/wiki/TRIM"
+TTL,Noun,,,
+Tails,Noun,Name of the organization and tool.,,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,,
+Take a stand,,,,
+Tamanho,,,,
+TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual Machine""Any HVM that depends on a TemplateVM for its root filesystem.",Máquina virtual de hardware basada en una plantilla,
+TemplateBasedVM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which depends on a TemplateVM for its root filesystem.",máquina virtual basada en una plantilla,"Este término al parecer se utiliza solo para explicar que hay diferentes orígenes para un AppVM, por lo que puede traducirse."
+TemplateHVM,Noun,"[QubesOS] ""Template Hardware Virtual Machine""Any HVM which functions as a TemplateVM by supplying [QubesOS] its root filesystem to other VMs.",Pantilla de máquina virtual de hardware (HVM),
+TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies its root filesystem to another VM.",TemplateVM,"Al igual que ""AppVM"" o ""NetVM"", se acuerda que se mantienen sin traducir ya que aparecen en el resultado de muchas operaciones en la línea de comandos. La idea de TemplateVM, cuando aparece por ejemplo en instrucciones, si se traduce y se agrega el término entre paréntesis."
+Terms & Privacy Policy,Noun,[Signal],,
+Text message,Noun,Synonym: SMS,,
+Thanks You,,,,
+Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",,
+Threat model,Verb,,,
+Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat model) (Source EFF)",,
+Throwaway,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",,
+Throwaway address,Noun,"An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
+Source EFF.",,
+Timestamp,Noun,,,
+To date though,,,,
+Toolkit,Noun,,,
+Tools,Noun,[Martus] Martus menu option.,Herramientas,
+Tor,Noun,[Orbot],Tor,
+Tor Blog,,,,
+Tor Blog,Noun,,,
+Tor Bridges,Noun,,Puentes Tor,
+Tor Browser,,,,
+Tor Browser,Noun,"[Orbot] Application Name (https://www.torproject.org/projects/torbrowser.html.en). You can translate the word ""Browser"", however ensure that it is translated consistently across all resources and projects.",Navegador Tor,
+Tor Browser Bundle,Noun,,,
+Tor Browser profile directory,Noun,,,
+Tor News,,,,
+Tor News,Noun,,,
+Tor Project,,,,
+Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be transcribed dependent on language.,el Proyecto Tor,
+Tor bridge,Noun,,,
+Tor messenger,Noun,[The Tor Project],,
+Tor network,Noun,,red Tor,
+Tor relay,Noun,[Tor] [Orbot],repetidor Tor,
+Torbutton,Noun,,,
+Touch ID,Noun,[Signal] Specific to iOS,,
+Trademark,Noun,,,
+Twitter,,,,
+Two-Factor,Noun,,,
+UI,Noun,user interface,,
+URL,Noun,,,
+US $,,,,
+USB drive,Noun,Specifically thumbdrives used as external storage.,,
+USB stick,Noun,,,
+UpdateVM,Noun,[QubesOS],,
+Uploaded,Adjective,[Globaleaks],,
+UsbVM,Noun,[QubesOS],,
+Usually,,,,
+VM,Noun,"""virtual machine""",VM,"Agreed that VM will remain untranslated, as it is common usage"
+VPN,,,,
+VPN,Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
+Synonyms: Virtual Private Network
+Source: EFF",,
+VPNs,,,,
+Vanilla Bridges,,,,
+Vidalia,Noun,,,
+Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",máquina virtual (VM),"Agreed that VM will remain untranslated, as it is common usage"
+Virtual Private Network (VPN),Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF)",VPN,
+"Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF)","red privada virtual, VPN","Una red privada virtual (o VPN, como  es conocida por sus siglas en inglés) es un método para conectar tu computadora de manera segura
  a un sistema de una organización en el otro lado de la Internet. Cuando usas una VPN, todo el sistema de comunicación de la Internet está en un paquete completo, cifrado e entregado a esta otra organización, donde ésta está cifrada, desempacada, y luego enviada a su destinatario. Enla red de la organización, o cualquiera otra computadora a todo lo largo de la Internet, esta parece como si la petición viene de adentro de la organización, no de tu localidad. Las VPN son usadas por negocios para proveer acceso seguro a recursos internos (como carpetas de servidores o impresoras). Ellas también son utilizadas por individuos para sobre-pasar censores o derrotar vigilancias locales."
+Virtual Private Server (VPS),Noun,Virtual Private Server,,
+VoIP Call,Noun,,,
+Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
+Synonyms: VoIP.
+Source EFF.",,
+WAN,Noun,,,
+Warning!,Interjection,ex: “Warning! Selecting 'OK' will permanently delete all files”,,
+Web-based proxy,Noun,"A website that lets its users access other, blocked or censored websites. Generally, the web proxy will let you type a web address (or URL) onto a web page, and then redisplay that web address on the proxy page. Easier to use than most other censorship-circumventing services.
+Source EFF.",,
+WebApp,Noun,,,
+Welcome,Noun,,,
+WhisperBack,Noun,,,
+WiFi,Noun,,WiFi,
+Windows,Noun,Operating system,,
+Work,Verb,,"Trabajar, Funcionar",
+World Wide Web,Noun,,,
+XMPP,Noun,"Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. [Signal]",XMPP,"Un estandar abierto de mensajería ánea  - Google usa XMPP para Google Talk; Facebook la ofrecía, pero dejó de hacerlo. Los servicios de mensajería ánea independientes no corporativos normalmente usan XMPP. Los servicios como WhatsApp tienen su propio protocolo cerrado y secreto."
+XSS,Noun,,,
+XXL,,,,
+YYYY,Noun,“Year” Indicates that user must input a 4-digit year (ex: 1990),,
+Zip,,,,
+about,Preposition,"[Globaleaks] As in, the “About” section of a website or application.",acerca,
+academic,,,,
+accept,Verb,[Signal],aceptar,
+access,Noun,,acceso,
+access,Verb,,acceder,
+access mode,Noun,,Modo de acceso,
+access token,Noun,"[Martus]
+Short identification number used to add Contacts to your Martus account.",Credencial de acceso,
+accessibility,Noun,,,
+account,Noun,,cuenta,
+account recovery,Noun,,Recuperación de cuenta,
+account recovery code,Noun,,Código de recuperación de cuenta,
+accountability,Noun,,contabilidad,
+accounting,,,,
+acknowledge,Verb,"An acknowledgment in Peerio is similar to a message, but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is referred to as an ""acknowledgment""",agradecer,
+acknowledged,Adjective,"An acknowledgment in Peerio is similar to a message, but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is referred to as an ""acknowledgment""",agradecido,
+acknowledgment,Noun,"American English — A button in Peerio that functions similar to a message, but sends a ""thumbs up"" icon with a timestamp. The thumbs-up icon is referred to as an ""acknowledgment""",agradecimiento,
+acquire,Verb,,adquirir,
+activate,Verb,[Orbot],activar,
+active,Adjective,,activo,
+activists,,,,
+activity,,,,
+activity,Noun,,actividad,
+ad provider,Noun,[Psiphon 3],,
+ad-blocker,Noun,,,
+add,Verb,,añadir,(Sinónimo: agregar)
+add-on,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)",complemento,
+add-ons,Noun,,,
+added,Adjective,,añadido,(Sinónimo: agregado)
+address,Noun,,dirección,
+address,Verb,"(1) To address a situation
+Synonyms:  to fix, to take care of
+
+(2) Give to data or a data set an address in memory
+
+(3) If a letter, envelope, or parcel is addressed to you, your name and address have been written on it.",,
+address bar,Noun,,,
+address book,Noun,,,
+admin,Noun,,,
+administrative,,,,
+administrators,Noun,,,
+advance,,,,
+advanced,Adjective,,"avanzado, -a",
+advanced,Noun,it is a noun?,,
+advanced search,Noun,[Martus],,
+advanced user,Noun,,,
+adversary,Noun,"Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.
+Source EFF.",,
+agenda notes,Noun,,notas para planear una agenda,
+agent,Noun,,,
+air gap,Noun,"A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.
+Source EFF.
+
+An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated from all other networks.
+Source Wikipedia",,
+air-gapped (air gapped),Adjective,,aislada,Un computador que no tiene conexión cableada o inalámbrica a una red
+airline miles,,,,
+airlines miles,,,,
+alpha,Noun,,,
+alternate,Adjective,,,
+alternate,Noun,,,
+alternative,Adjective,,,
+alternative,Noun,,,
+ambiguous,Adjective,,,
+and/or,Conjunction,,,
+anomaly,Noun,[Globaleaks],,
+anonymity,,,,
+anonymity,Noun,[Orbot],anonimato,
+anonymization,Noun,"""It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous."" (Source: https://en.wikipedia.org/wiki/Data_anonymization)",anonimización,
+anonymize,Verb,"[Orbot] To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization) [Signal]",anonimizar,"""l anonimato es el carácter o la condición de anónimo,1​ es decir, que la identidad de una persona o entidad es desconocida."" (Fuente: https://es.wikipedia.org/wiki/Seudonimato_y_anonimato)"
+anonymizing,,,,
+anonymous,,,,
+anonymous,Adjective,[Orbot],anónimo,
+anonymously,,,,
+anti-censorship,,,,
+antivirus,Noun,"Software that attempts to protect a device from being taken over by malicious software (or “malware""). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.
+Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.
+Source EFF.",antivirus,
+anyone,,,,
+app,Noun,"[Orbot] Abbreviation of ""application."" (Synonyms: application)","aplicación, app",
+app switcher,Noun,[Signal] Specific to iOS,,
+application,Noun,"[Orbot] An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. (Source: https://en.wikipedia.org/wiki/Application_software) [Signal]",aplicación,
+apply,Verb,,solicitar,
+appreciates,,,,
+approach,Noun,,forma de encarar,
+approve,Verb,,aprobar,
+archive,Noun,"An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.
+https://en.wikipedia.org/wiki/Archive_file",archivo,
+archive,Verb,[Signal],guardar,
+argument,Noun,,,
+arrive,Verb,,llegar,
+article,Noun,,,
+as root,Noun,,,
+asset,Noun,"In threat modeling, any piece of data or a device that needs to be protected.
+Source EFF.",,
+asymmetric-key encryption,Noun,"Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password ""bluetonicmonster"", you would need both the file and the secret ""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the ""public key"": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Public key encryption, Public key cryptography. (Source EFF)",,
+at the Heart of Internet Freedom,,,,
+attach,Verb,To attach a file to a message,,
+attachment,Noun,[Signal] File sent together with an email or other electronic message.,adjunto,
+attack,Noun,"In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an ""exploit.""
+Source EFF.",,
+attacker,Noun,,,
+audio,Adjective,[Signal],,
+audio,Noun,,,
+auth token,Noun,[Orbot],"token de autenticación, token de seguridad","""Un token de seguridad (también token de autenticación o token criptográfico) es un aparato electrónico que se le da a un usuario autorizado de un servicio computarizado para facilitar el proceso de autenticación."" (Fuente: https://es.wikipedia.org/wiki/Token_de_seguridad)"
+authenticate,Verb,,acreditar,
+authenticated,Adjective,,,
+authentication,Noun,[Signal],,
+authentication ,Noun,[Signal],,
+author,Noun,,autór,
+authorize,Verb,,,
+automated traffic,Noun,,,
+autonomous system number,Noun,,,
+availability,,,,
+availability,Noun,,,
+available,Adjective,,disponible,
+avatar,Noun,"A computer generated visual icon used as an alternative digital fingerprint. aka ""identicon"". [Signal]",,
+back,,,,
+back,Noun,As in “Back” button,,
+back,Verb,,,
+back up,Verb,,crear copia de seguridad,
+background,Noun,Screen surface where text and graphic elements are displayed,segundo plano,
+backlog,Noun,Delayed processing of some sort,,
+backup,Noun,"[Signal] [Orbot] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely.","copia de seguridad, respaldo",
+badge,Noun,[Signal],,
+balance,Noun,What is left to be paid or recovered.,,
+bandwidth,Noun,[Orbot],ancho de banda,
+bank fees,,,,
+bar,Noun,,,
+bar chart,Noun,,gráfico de barras,
+bare-metal,Adjective,,,
+base,,,,
+batch select,Noun,[Signal],,
+battery,Noun,,,
+be careful,,,,
+best-effort delivery,Noun,,,
+beta,Noun,,,
+big data,Noun,,datos masivos,
+billing,,,,
+binaries,Noun,,,
+binary,Noun,"Binary file.
+8-bit encoded data file using only 0 and 1, different from ASCII which is 7-bit encoded.",archivo binario,"""Un archivo binario es un archivo informático que contiene información de cualquier tipo codificada en binario para el propósito de almacenamiento y procesamiento en ordenadores. Por ejemplo los archivos informáticos que almacenan texto formateado o fotografías, así como los archivos ejecutables que contienen programas"" (Fuente: https://es.wikipedia.org/wiki/Archivo_binario)"
+block,,,,
+block,Noun,,,
+block,Verb,[Signal],,
+blocked,Adjective,,,
+blocked access,Noun,,,
+blockfile,Noun,[I2P] http://www.i2p2.de/blockfile.html,,
+blocking,Noun,"Synonyms: filtering, censoring Internet traffic.",,
+blocking resistant,Adjective,,,
+blog,Noun,,,
+blog post,Noun,"Short text posted to a blog, the content of which is left entirely to the discretion of the author.",,
+blogging,Noun,Posting to a blog and updating it regularly.,,
+body,Noun,,cuerpo,
+bookmark,Noun,,favorito,
+boolean,Adjective,,tipo de dato lógico / boolean,"""El tipo de dato lógico o booleano es en computación aquel que puede representar valores de lógica binaria, esto es 2 valores, valores que normalmente representan falso o verdadero."" - Wikipedia"
+boolean,Noun,,tipo de dato lógico / boolean,"""El tipo de dato lógico o booleano es en computación aquel que puede representar valores de lógica binaria, esto es 2 valores, valores que normalmente representan falso o verdadero."" - Wikipedia"
+boot,Noun,[Orbot],"ejecutación, iniciación",
+boot,Verb,[Orbot],arrancar / ejecutar / iniciar,
+bootable,Adjective,,arrancable / ejecutable,
+bootloader,Noun,,cargador de arranque,g
+bot,Noun,,,
+botnet,Noun,,,
+bounce,Verb,,,
+bouncing,,,,
+bounty,Noun,,,
+box,Noun,,,
+break in,Noun,,irrupción,
+bridge,Noun,[Orbot] [Tor],puente de red,
+bridge,Verb,[Tor],puentear,
+bridge line,Noun,[Tor] a line with the bridge configuration,línea compartida,
+bridge relay,Noun,[Tor],repetidores de puente de red,
+bridge type,Noun,[Tor],tipo de puente de red,
+broad range,,,,
+broadcast,Verb,[Signal],,
+browse,Verb,[Orbot],navegar,
+browser,,,,
+browser,Noun,web browser,navegador,
+browser fingerprint,Noun,"The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.
+Source EFF.",,
+browsing,,,,
+buffer,Noun,,,
+bug,Noun,,error,
+bug report,Noun,[Signal],informe de error,
+bundle,Noun,,,
+bundled,Adjective,,,
+burden,,,,
+burner phone,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
+(Source: EFF)",,
+button,Noun,,,
+by,Adverb,,,
+bypass,Verb,,"pasar, evitar, eludir",
+bytes,Noun,[Globaleaks],,
+cache,Noun,,,
+cache,Verb,,,
+cache-busting,Noun,,,
+calendar,Noun,,,
+camera,Noun,,,
+cams,,,,
+can,Verb,,,
+cancel,Verb,[Signal],cancelar,
+cannot,Verb,,,
+capability,Noun,"The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has"" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
+Source EFF.",,
+car documents,Noun,[Umbrella],,
+carjacking,Noun,,,
+carry,,,,
+case management,Noun,[GlobaLeaks],,
+cash,,,,
+cc,Noun,“carbon copy”,,
+censor,,,,
+censored,,,,
+censored,Adjective,,"censurado, -a",
+censorship,,,,
+censorship,Noun,[Signal],censura,
+cerificate,,,,
+certificate,Noun,,certificado,
+certificate,Verb,To give a certificate,,
+certificate authority,Noun,,,
+certificate chain,Noun,[Globaleaks],,
+certificate chain file,Noun,[Globaleaks],,
+certificates,Noun,"Is it needed, the plural form defined here? The singular already exists.",,
+chain,Noun,,,
+change,Verb,,,
+change log,Noun,,,
+charges,,,,
+chart,Noun,,,
+chat,Noun,[Signal],chat,(m.)
+chat,Verb,[Signal],chatear,
+check,Verb,,comprobar,
+checking,,,,
+checkpoint,Noun,,,
+checksum,Noun,,suma de comprobación,
+choke,Verb,,,
+chokepoint,Noun,,,
+choker,Noun,,,
+choose,Verb,,,
+choose ,Verb,,,
+chronic stress,Noun,,,
+cipher,Noun,,,
+ciphertext,Noun,,,
+circuit,Noun,[Orbot],circuito,
+circuits,,,,
+circuits,Noun,,,
+circumvent,Verb,[Orbot],evitar o eludir,
+circumvention,Noun,[Signal] [Orbot],elusión de la censura,
+clear,Verb,[Signal] [Orbot],limpiar,
+cleartext,Noun,,,
+click,Noun,,,
+click,Verb,[Signal],hacer clic,
+click and hold,Verb,,,
+clickjacking attack,Noun,,,
+client,Noun,"[Signal] [Orbot] As in ""desktop client"" or ""Android client.""",cliente,
+clipboard,Noun,[Signal],,
+clock skew,Noun,,,
+close,Verb,,,
+cloud,,,,
+cloud server,Noun,[Orbot],servidor de la nube,
+cloud storage,Noun,,,
+coarse data,Noun,Unprocessed data,,
+code,Noun,,,
+codec,Noun,,,
+collected,,,,
+collection,,,,
+collection,Noun,,,
+collusion,Noun,,,
+collusion attack,Noun,,,
+color,Noun,,,
+column,Noun,,Columno,
+command,Noun,,,
+command and control server,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
+Synonyms: C&C, C2.
+Source EFF.",,
+command line,Noun,,lí­nea de Órdenes,"evitar el falso cognado «comando», que no significa lo mismo
+I respectfully disagree. 'línea de comando' is very well understood as an only-text interface where you interact with some kind of shell."
+comment,Noun,[Globaleaks],,
+commercial VPN,Noun,"A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, or untrusted local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The down side is that most of the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to snoop on your traffic.
+Source EFF.",,
+communicate,Verb,,,
+communication,,,,
+communication,Noun,,,
+community,,,,
+community,Noun,,,
+community center,Noun,,,
+companies,,,,
+compartmentalization,Noun,,Compartimentación,
+compartmentalize,Verb,,,
+compatible,Adjective,,compatible,
+complete,Verb,,,
+completed,Adjective,,,
+compose,Verb,[Signal],componer,
+compressed,Adjective,,,
+compression,Noun,,compresión,
+compression/decompression tool,Noun,,herramienta de compresión/descompresión,
+compromise,Verb,,,
+compromised,Noun,[Globaleaks],,
+computer,Noun,[Signal],computadora,(Sinónimo: ordenador)
+concern,,,,
+concordance,Noun,,,
+conference,Noun,,,
+conferences,,,,
+confidentiality,Adjective,[Globaleaks] [Orbot],confidencialidad,
+configuration,Noun,[Globaleaks] [Orbot],configuración,
+configure,Verb,[Signal] [Orbot],configurar,
+confirm,Verb,,confirmar,
+connect,Verb,[Signal],,
+connecting,Verb,,,
+connection,,,,
+connection,Noun,[Orbot],conexión,
+consensus,Noun,,consenso,
+constraint,Noun,,,
+contact,Noun,[Signal] [Martus] Another Martus user with whom you can share your Martus bulletins.,Contacto,
+contact info,Noun,,,
+contact information,Noun,,,
+contact request,Noun,,,
+content,Noun,,,
+context,Noun,"[Globaleaks] Tips are classifies in contexts, e.g. corruption",,
+control panel,Noun,,panel de control,
+control port,Noun,,,
+conventional,Adjective,,convencional,
+conversation,Noun,"A ""conversation"" is the same as a message ""thread"" [Signal]",conversación,
+cookie,Noun,"[Orbot] Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in. (Source : EFF)",cookie,"Cookies son una tecnología de la web que permite a los sitios web reconocer tu navegador. Las cookies fueron originalmente diseñadas para permitir a los sitios ofrecer canastas de compras, guardar las preferencias o mantenerte logueado en un sitio. Ellos también permiten rastrear y perfilarte,  para que de esta manera los sitios puedan reconocerte y conocer mas sobre tu navegación, que dispositivo usas, y en que estás interesado – inclusive si no tienes una cuenta con ese sitio, o no has entrado en el."
+cookies,Noun,,,
+copy,Verb,,,
+corporate foundation,,,,
+corporate intranet,Noun,"Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.
+Source EFF.",,
+country,,,,
+crack,,,,
+crash,Noun,,,
+crash report,Noun,,,
+create,Verb,,,
+credentials,Noun,,,
+credit card,,,,
+credits,Noun,,,
+critical,,,,
+cropping,Noun,,,
+cross-certification,Noun,,,
+crucial,Adjective,,,
+cryptocurrency,Noun,,,
+cryptographers,,,,
+cryptographic signature,Noun,"The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
+Synonyms: digital Signature
+Source EFF.",,
+cryptography,Noun,"The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.
+Source EFF.",,
+cryptoparty,Noun,"When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others ""I believe this key belongs to this person -- and if you trust me, you should believe that too."" Telling the world that you trust someone's key is called ""signing their key"": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to other friends.
+Synonyms: key-signing party.
+Source EFF.",,
+"crítico, críticos, de segurança pessoal da informação",,,,
+current,Adjective,,,
+currently,,,,
+curriculum for trainers,Noun,,la currícula para talleres/talleristas,
+custidoan,Noun,,,
+custodian,Noun,[Globaleaks],,
+custom,Adjective,,,
+customer support,Noun,,asistencia al cliente,
+customization,Noun,[Globaleaks],,
+customize,Verb,,personalizar,
+cut,Verb,,,
+daemon,Noun,,,
+dashboard,Noun,,,
+data,Noun,[Signal] [Orbot],datos,
+data package,Noun,,,
+data retention,Noun,,,
+data storage,Noun,,,
+data-Driven Dropdown (Field),Noun,[Martus],,
+database,Noun,[Signal],base de datos,
+datastore,Noun,http://en.wikipedia.org/wiki/Datastore_network,,
+date range,Noun,,,
+day,Noun,,,
+deactivate,Verb,[Orbot],desactivar,
+debit,,,,
+debriefing,Noun,,,
+debug,Verb,,depurar,
+debug log,Noun,[Signal],,
+debug mode,Noun,,,
+debugging,Noun,,depuración,
+deck,Noun,[Ooniprobe] This is a collection of ooniprobe tests and inputs.,,
+decline,Verb,"[Signal] To reject. As in ""Decline an incoming call.""",,
+declined,Verb,,,
+decompression,Noun,,,
+decorating,,,,
+decrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption of data. [Signal],descifrar,Criptografía es el processo de cifrar and descifrar datos.
+decrypted,Adjective,[Signal],,
+decryption,Noun,[Orbot],descifrado,
+dedicated server,Noun,[Globaleaks],,
+deductible,,,,
+deepending,Adjective,,profundizar / profundización,Para saber más o Profundizar o Profundización - editora de estilo debe de escoger y hacer estandard.
+default,Adjective,[Globaleaks] [Signal] [Orbot],"por defecto, predeterminado",
+default,Noun,[Orbot],"por defecto, predeterminado",
+default server,Noun,,Servidor predeterminado,
+defenders,,,,
+delay,Noun,,,
+delete,Verb,[Globaleaks] [Signal],eliminar,Sinónimo: borrar
+deleted,Adjective,,"eliminado, -a",
+deletion,Noun,[Globaleaks],,
+deprecated,Adjective,,,
+descriptor,Noun,"Identification item for a file, a program or a data.",,
+deselect,Verb,,,
+desktop,Noun,[Signal],computadora,
+destroy,Verb,Removes message/file from the entire Peerio server and all users' accounts,,
+detail,Noun,[Signal],,
+detection,Noun,,,
+deter,,,,
+device,Noun,[Signal] [Orbot],dispositivo,(Sinónimo: aparato)
+dialog,Noun,,,
+diceware,Noun,,,
+digital,Adjective,,,
+digital,Noun,,,
+digital certificate,Noun,"A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
+Synonyms: Security certificate.
+Source EFF.",,
+digital signature,Noun,"The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
+Synonyms: cryptographic signature.
+Source EFF.",,
+diplomats,,,,
+directory,Noun,[Signal],,
+directory authorities,Noun,,,
+disable,Verb,[Signal] [Orbot],deshabilitar,
+disabled,,,,
+disabled,Adjective,,,
+disabled,Verb,,,
+disappearing message,Noun,[Signal],"desaparición de mensaje, caducidad de mensajes",la traducción depende del contexto
+discard,Verb,[Signal],descartar,
+disclaimer,Noun,,,
+disconnect,Verb,[Signal],,
+discouraged,,,,
+discussion,Noun,,debate,
+disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of removable storage device (USB, CD, floppy disk etc.)",disco,
+diversify,,,,
+document,Noun,[Signal],,
+domain,Noun,An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube.,Dominio,"(Quizás aqui se podría elegir otro término, que no dependa del término técnico ""domain"", que no se confunda con el témino domino utilizado para DNS y que sea más claro que en Qubes se refiere a diferentes entornos o ámbitos de trabajo) Se decidio continuar con la idea de dominio."
+domain name,Noun,"The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF)",,
+domestic violence survivors,,,,
+donating,,,,
+donation,,,,
+donations,,,,
+donations,Noun,"feminine noun, otherwise a (V) verb. 
+eu doo
+tu doas
+ele doa
+nós doamos
+vós doais
+eles doam",,
+donations options,,,,
+donor,Noun,,,
+download,,,,
+download,Noun,[Globaleaks],descarga,
+download,Verb,[Globaleaks],descargar,Sinónimo: bajar
+draft,Noun,,,
+drag,Verb,,,
+drop-down list,Noun,,,
+dual boot,Noun,,,
+ePub Reader,Noun,,,
+eQualitie,Noun,Do not translate,,
+eavesdropper,Noun,,,
+eavesdroppers,,,,
+edit,Verb,,,
+eepsite,Noun,,,
+eligibility criteria,Noun,,,
+email,,,,
+email,Noun,,,
+email address,,,,
+email address,Noun,,,
+email identity (e-mail identity),Noun,Synonym: e-mail identity,,
+email provider,Noun,,,
+"email, e-mail",Noun,Synonym: e-mail,,
+emailing,,,,
+embedded,Adjective,,,
+emoji,Noun,[Signal],emoji,
+enable,Verb,[Signal] [Globaleaks] [Orbot],habilitar,
+enabling,,,,
+encoded,Adjective,,,
+encrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption of data. [Signal],cifrar,
+encrypted,Adjective,[Globaleaks],cifrado,
+encrypted communication,Noun,,,
+encrypted message,Noun,,,
+encrypted persistent storage,Noun,[Tails],almacenamiento cifrado persistente,
+encryption,Noun,"[Globaleaks] [Orbot] A process that takes a message and makes it unreadable except to a person who knows how to ""decrypt"" it back into a readable form. (Source: EFF)",cifrado,
+encryption key,Noun,"[Globaleaks] An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different. (Source: EFF)",,
+end-to-end,Conjunction,,,
+end-to-end encryption,Noun,"End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption. (Source: EFF) [Signal]",cifrado de extremo a extremo,
+end-user,Noun,,,
+engine,,,,
+ensure,,,,
+enter,Verb,,entrar,
+entry guard,Noun,,,
+error,Adjective,,,
+error,Noun,[Signal],error,
+event log,Noun,,,
+exception,Noun,,,
+exchange,Verb,,,
+excited,,,,
+executable,Noun,,,
+exercised,,,,
+exit,Noun,,,
+exit,Verb,,,
+exit relay,,,,
+exit relay,Noun,,,
+exited,Verb,,,
+experience,Verb,,,
+expiration,Noun,,,
+expiration date,Noun,,,
+expire,Verb,[Signal],"caducar, expirar",
+expired,Noun,,caducado,
+expiry,Noun,[Globaleaks],expiración,(Sinónimo: caducidad)
+expiry,Verb,[Signal],,
+export,Noun,[Signal],,
+export,Verb,[Signal],exportar,
+extend,Verb,[Globaleaks],,
+extension,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: Add-on, Plugin)(Source: EFF)",,
+extent,,,,
+external storage,Noun,,,
+extract,Verb,,,
+fail,Verb,[Signal],,
+failed,Adjective,,,
+faq,,,,
+fax,Noun,[Signal] As in “fax machine.”,,
+feature,Noun,[Signal],,
+feature set,Noun,,,
+feed,Noun,E.g. RSS feed,,
+feedback,,,,
+fees,,,,
+fetch,Verb,[Signal],,
+ficheiro,Noun,,,
+field,,,,
+field,Noun,[Globaleaks] A data entry field,Campo,
+figuring out,,,,
+file,Noun,A data entry field [Signal] [Globaleaks],Archivo,
+file ,Noun,,,
+file attachment,,,,
+file attachment,Noun,[Globaleaks],,
+file container,Noun,,,
+file sharing,Noun,,,
+filed,,,,
+filesystem,Noun,,,
+filled out,,,,
+filter,Noun,,,
+financial,,,,
+financially,,,,
+find,Verb,,,
+fingerprint,Noun,"[Orbot] The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits. So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.
+Source EFF.",huella dactilar,"Las llaves de la criptografía de clave pública son números muy grandes, a veces, mil o más dígitos. Una huella dactilar es un número mucho más pequeño o un conjunto de números y letras que se pueden utilizar como un nombre único para esa clave, sin tener que enumerar todos los dígitos de la clave.; Así, por ejemplo, si tú y un amigo desean asegurarse de que ambos tienen la misma clave, se puede o bien leer durante un largo tiempo todos los cientos de dígitos de la clave, o podrían cada uno calcular la huella digital de su clave y compararlas en su lugar. Las huellas dactilares presentadas por software criptográfico lo general consisten en alrededor de 40 letras y números. Si revisas cuidadosamente que una huella digital tiene el valor correcto, estarás seguro contra la suplantación por clave falsa. Algunas herramientas de software pueden ofrecer formas alternativas más convenientes para verificar la clave de un amigo, pero algún tip
 o de verificación tiene que darse para prevenir que los proveedores de comunicaciones sean capaces de interceptarte con facilidad."
+fingerprint identification,Noun,,,
+firewall,Noun,"[Orbot] A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways. (Source: EFF)",firewall,"Una herramienta que protege una computadora de conexiones indeseadas a/o de un sistema local y la red de la Internet. Un firewall puede tener reglas que prohiben que la salida de  correo electrónico, o conexiones a ciertos sitios web. Firewalls puede ser utilizados como una primera linea de defensa para proteger un dispositivo de interferencias inesperadas. O pueden ser utilizadas para prevenir a los usuarios usar la Internet de ciertas maneras."
+fits,,,,
+fix,Noun,,,
+fix,Verb,,,
+flight vouchers,,,,
+floodfill,Noun,,,
+floodfill peer,Noun,,,
+folder,Noun,[Signal],carpeta,
+follow,Verb,,,
+for,Preposition,,,
+form,,,,
+forum,Noun,[Signal],foro,
+forward,,,,
+forward,Verb,"[Signal] As in, “to forward an email or a message.”",,
+foundations,,,,
+fragment,Noun,,,
+fraudulent ,,,,
+free,,,,
+free,Adjective,,,
+freedom,Noun,[Orbot],libertad,
+freedoms,,,,
+frontdesk,,,,
+full restricted route,Noun,,,
+fund us,,,,
+funding,,,,
+furthering,,,,
+gateway,Noun,,,
+gender,Noun,,,
+general,Adjective,,,
+generate,Verb,"As in ""generate key"" [Signal]",generar,
+generation,Noun,,,
+generation ,Noun,,,
+generator,Noun,,generador,
+generator ,Noun,,generador,
+geo-location,Noun,,geolocalización,
+geography-based blocking,,,,
+gift,,,,
+gift cards,,,,
+gift matching,,,,
+gist,Noun,"""In computing, Gist is a scientific graphics library written in C by David H. Munro of Lawrence Livermore National Laboratory. It supports three graphics output devices: X Window, PostScript, and Computer Graphics Metafiles (CGM). The library is promoted as being small (writing directly to Xlib), efficient, and full-featured. "" -https://en.wikipedia.org/wiki/Gist_(computing) [Signal]",,
+giving,,,,
+goal,Noun,,objetivos,
+grants,,,,
+guard,Noun,,,
+guard relay,Noun,[The Tor Project],,
+guidelines,Noun,,,
+handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,,
+hardware,,,,
+header,Noun,,,
+help,Noun,,Ayuda,
+help,Verb,,Ayudar,
+helper link,Noun,,,
+helper link ,Noun,,,
+hidden service,Noun,,,
+hidden services,,,,
+hidden volume,Noun,[VeraCrypt],,
+hide,Verb,,,
+high bandwidth,Noun,,,
+high capacity,Noun,,,
+high latency,Noun,,,
+high-quality,,,,
+hint,Noun,,,
+history,Noun,"As in ""Browser History""",historia,
+home,Noun,[Globaleaks],,
+home directory,Noun,,,
+hoodie,,,,
+hoodie,Noun,,,
+hoodies,,,,
+host,Noun,[Signal] [Globaleaks] [Orbot],servidor,
+host,Verb,[Orbot],"alojar,",
+hostname,Noun,,,
+hostnames,Noun,,,
+hour,Noun,,,
+however,,,,
+https://tb-manual.torproject.org/en-US/bridges.html,,,https://tb-manual.torproject.org/es-ES/bridges.html,
+human rights,,,,
+human rights,Noun,,Derechos humanos,
+human rights abuses,,,,
+i.e.,Noun,,,
+iCloud,Noun,[Signal],,
+iOS,Noun,,,
+iPhone,Noun,,,
+ice breakers,Noun,,Ejercicios dinamizadores y energizantes,
+icon,Noun,[Signal] [Orbot],ícono,
+identicon,Noun,"A computer generated visual icon used as an alternative digital fingerprint. aka ""identicon"".
+Synonym: avatar",,
+identity,Noun,[Orbot],identidad,
+ignore,Verb,,,
+illegal,,,,
+illustrated,Adverb,,,
+illustrated ,Adverb,,,
+image,Noun,,,
+implement,,,,
+import,Noun,[Signal],,
+import,Verb,[Signal],importar,
+improve,Verb,,mejorar,
+in touch,,,,
+in-transit encryption,Noun,,,
+inactivity timeout,Noun,,,
+inbox,Noun,,,
+include,Verb,,,
+incognito,Noun,[Signal],incógnito,
+income,,,,
+incoming,Adjective,[Signal],,
+incompatible,Adjective,,,
+incremental,Adjective,,,
+individuals,,,,
+info,Noun,,,
+information,Noun,,,
+informator,Noun,[Globaleaks],,
+input,Noun,,insumos,
+input,Verb,[Globaleaks],,
+inquiries,,,,
+install,Verb,[Orbot],instalar,
+installation,Noun,,,
+installer,Noun,,,
+institutions,,,,
+intended,,,,
+intercept,Verb,[Signal],,
+interface,Noun,,,
+internet,Noun,[Signal] [Orbot],internet,
+internet ,,,,
+"internet filtering, content filtering",Noun,[Orbot] Filtering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF),filtrado de internet,Filtering/Filtrado es un termino educado para decir que se ha bloqueado o censurado el tráfico de la Internet.
+interrupt,Verb,,,
+intranet,Noun,,,
+invalid,Adjective,[Orbot],inválido,
+involved,,,,
+iptables,Noun,"[Orbot] ""iptables is a user-space utility program that allows a system administrator to configure the tables[2] provided by the Linux kernel firewall (implemented as different Netfilter modules) and the chains and rules it stores. Different kernel modules and programs are currently used for different protocols; iptables applies to IPv4, ip6tables to IPv6, arptables to ARP, and ebtables to Ethernet frames."" (Wikipedia)",iptables,
+isim,,,,
+isolate,Verb,,Aislar,
+isolation,Noun,,Aislamiento,
+issue,Noun,[Signal],,
+jar,Noun,"“A JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.” (https://en.wikipedia.org/wiki/JAR_(file_format))",,
+jump service link,Noun,,,
+kernel,Noun,,,kernel
+key,Noun,"In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. (Source EFF) [Globaleaks] [Signal]",clave,
+key ID,Noun,,,
+key code,Noun,[Globaleaks],,
+key list,Noun,,,
+key owner,Noun,,,
+key pair,Noun,"To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a ""key pair.""
+Source EFF.
+Synonym: keypair",par de claves,
+key password,Noun,,,
+key size,Noun,,,
+keyboard,Noun,[Signal],teclado,
+keychain,Noun,,grupo de claves,
+keypair (key pair),Noun,,par de claves,
+keyring,Noun,"If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring.
+Source EFF.",juego de claves,"""keyring"" se traduce literalmente ""argolla de las llaves"". En español, decir eso es rebuscado. Es preferible decir ""llavero"", pues un llavero está asociado a esa argolla. Como sea, en este contexto donde no son llaves sino claves, es mejor decir ""juego de claves""."
+keyserver,Noun,,,
+keyword,Noun,,Palabras claves,
+kidnapping,Noun,,secuestro,
+kind,,,,
+kinds,,,,
+label,Noun,[Globaleaks],título,
+language,Noun,[Globaleaks],,
+large,,,,
+launch,Noun,,,
+launch,Verb,[Signal],,
+law enforcement,Noun,"Sometimes used for ""law enforcement agencies"".",,
+law enforcement agency,Noun,,,
+learn,,,,
+legal,,,,
+legal costs,,,,
+legitimate,Adjective,,,
+library,Noun,"Refers to a ""library"" in computing",biblioteca,"""En informática, una biblioteca (del inglés library) es un conjunto de implementaciones funcionales, codificadas en un lenguaje de programación, que ofrece una interfaz bien definida para la funcionalidad que se invoca."" - Wikipedia"
+license,Noun,,,
+license ,Noun,,,
+licensing,Noun,,,
+limited edition,,,,
+line-of-sight,Noun,,,
+link,Noun,,enlace,
+link,Verb,[Signal],,
+linked device,Noun,[Signal] A mobile phone with a Signal account that is connected to a Signal Desktop account.,,
+little,,,,
+live,Adverb,,,
+load,Noun,[Globaleaks],,
+load,Verb,[Globaleaks] [Signal],cargar,
+loading,Verb,[Globaleaks],,
+locate,Noun,,,
+located,,,,
+location,Noun,,ubicación,(Sinónimo: localización)
+lock,Verb,,,
+lock icon,Noun,,,
+log,Noun,[Signal] [Orbot],registro,
+log,Verb,[Globaleaks],,
+log data,Noun,,,
+log file,Noun,,,
+log in,Verb,,,
+logged in,Adjective,[Globaleaks],,
+logging,,,,
+logging,Noun,,,
+login,Noun,[Globaleaks],iniciar sesión,
+logo,Noun,,,
+logout,Noun,[Globaleaks],cerrar sesión,
+long,Adjective,[Globaleaks],,
+low latency,Noun,,,
+macOS,Noun,[Signal],,
+machine learning,Noun,,,
+mail,,"In Português when you say ""Mail"" we understand it as ""snail mail"" that in Português means, ""correio""",,
+mail,Noun,,,
+mailbox,Noun,,,
+mailing,,,,
+mailing address,,,,
+mailing list,Noun,,,
+main menu,Noun,,,
+maintain,Verb,,,
+manifest,Noun,,,
+manual,Adjective,,,
+master key,Noun,,,
+match,Verb,,,
+match ,Verb,,,
+matching,,,,
+"mbps, MB/s",Noun,[Orbot] megabytes per second,"mbps, MB/s",megabit por segundo
+mechanism,,,,
+media,Noun,[Signal],media,
+media message,Noun,[Signal],mensaje multimedia,
+member,,,,
+membership program,,,,
+menu,Noun,,Menú,
+menu bar,Noun,[Signal],,
+message,Noun,[Signal],mensaje,
+message body,Noun,,,
+message thread,Noun,"Alternative to ""conversation""",,
+messaging,Noun,[Orbot],mensajería,
+meta search engine,,,,
+metadata,Noun,"Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF) [Signal]",,
+method,,,,
+microphone,Noun,[Signal],,
+middle relay,Noun,,,
+migrate,Verb,[Signal],,
+miniLock,Noun,,,
+minimize,Verb,Minimize a window,,
+ministreaming library,Noun,[I2P],,
+minute,Noun,,,
+mirror,Noun,,,
+miscellaneous,Adjective,,,
+missing,,,,
+mixed content,Noun,,,
+mobile,Adjective,,móvil,
+mobile data,Noun,,datos móviles,Cuando se usa la red celular para conectar con el Proveedor de Servicio de Internet
+mobile devices,,,,
+mobile notifications,Noun,,,
+mobile number,Noun,,,
+modal,Adjective,,,
+mode,Noun,[Globaleaks] [Orbot],modo,
+modes,,,,
+module,Noun,,,
+money order,,,,
+monitor,,,,
+month,Noun,,,
+mount,Verb,,,
+mouse,Noun,,,
+move,Verb,,,
+multi-boot,Noun,,,
+multimedia,Adjective,[Signal],multimedia,
+mute,Noun,[Signal],,
+mute,Verb,,,
+name,,,,
+name,Noun,,,
+nameserver,Noun,,,
+nearly,,,,
+neighborhood,Noun,,,
+network,,,,
+network,Noun,[Signal] [Orbot],red,
+network admin,Noun,,,
+network administrator,Noun,,,
+network request,Noun,,,
+networking,Noun,,,
+new,Adjective,,,
+nickname,Noun,,nombre de usuario,
+"nickname, nick",Noun,[Orbot],nombre de usuario,
+node,Noun,[Orbot],nodo,
+non-financial,,,,
+non-private,,,,
+non-profit organization,,,,
+nonprofits,,,,
+note,Noun,,,
+notification,Noun,[Globaleaks] [Signal],notificación,
+notify,Verb,,,
+obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",ofuscar,
+obfuscation,Noun,"Transformation of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",,
+obfuscation layer,Noun,"Related to data transmission
+[Tor]",,
+offline,Adjective,[Signal],"fuera de línea / desconectado, -a",
+onboarding,Noun,,,
+once,,,,
+onion service,Noun,[Tor],,
+online,,,,
+online,Adjective,[Signal],"en línea / conectado, -a",
+open,Adjective,,,
+open,Verb,,,
+open source,Noun,[Orbot],código abierto,
+open-source,Adjective,[Orbot],de código abierto,
+opened,Verb,,,
+operate,,,,
+operator,Noun,,,
+opt,,,,
+optical,Adjective,,,
+optimization,Noun,[Orbot],optimización,
+optimize,Verb,[Signal] [Orbot],optimizar,
+option,Noun,,,
+optional,Adjective,,,
+options,,,,
+or via,,,,
+order,Verb,[Globaleaks],,
+organizations,,,,
+organize,Verb,,,
+other,Adjective,,,
+outer volume,Noun,,,
+outgoing,Adjective,[Signal],,
+output,Noun,,,
+overlay,Noun,,,
+overview,,,,
+overview page,,,,
+owner,Noun,,,
+ownership,Noun,,,
+pack,,,,
+package,Noun,,,
+package manager,Noun,,,
+padding,Noun,[Orbot],,
+pager,Noun,[Signal],,
+paid,,,,
+pair,Verb,"To link devices, using bluetooth for example. [Signal]",,
+paper,Noun,,,
+paperwork,,,,
+paravirtualization,Noun,"""Paravirtualization"" An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.",paravirtualización,
+parent,Adjective,,,
+parse,Verb,,,
+part,Noun,,,
+partial,Adjective,,,
+partially,Adverb,,,
+partition,Noun,"""Disk partitioning or disk slicing[1] is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately."" -https://en.wikipedia.org/wiki/Disk_partitioning",partición,"""Una partición de disco, en mantenimiento, es el nombre genérico que recibe cada división presente en una sola unidad física de almacenamiento de datos."" -https://es.wikipedia.org/wiki/Partici%C3%B3n_de_disco"
+passcode,Noun,A user-chosen and device-specific password. [Signal],,
+passphrase,Noun,A computer-generated set of 6-10 random words used as the primary authentication for Peerio accounts. [Signal],"Frase contraseña, clave de acceso",
+password,Noun,"A secret meant to be memorized, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a ""passphrase"" to remind us that it's not just one ""word."" A main password to unlock other passwords in a password manager or password safe application is often called a ""master password.”
+Source EFF.",contraseña,
+passwords,Noun,,,
+paste,Noun,,,
+paste,Verb,,,
+path,Noun,,,
+payload,Noun,,,
+payment,,,,
+peer,Noun,,,
+peer reviewed,Adjective,,,
+peer-to-peer,,,,
+peers,Noun,,,
+pending,Adjective,[Signal],,
+penetration test,Noun,,,
+perceived performance,Noun,,,
+performance,Noun,,,
+permission,Noun,[Signal] [Orbot],permiso,
+persistence,Adjective,,,
+persistence,Noun,,,
+persistence partition,Noun,,,
+persistent,Adjective,,,
+persistent overlay,Noun,,,
+persistent storage,Noun,[Tails],,
+persistent volume,Noun,,,
+phishing,Noun,,fraude informático para obtener información confidencial,
+physical surveillance,Noun,,seguimiento,
+pin,Verb,"Pin a tab, a site in a browser.",,
+ping,Noun,[Globaleaks],,
+please,Adverb,,,
+please mail,,,,
+pluggable transports,Noun,,,
+plugin,Noun,"A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: add-on, extension)(Source: EFF)",complemento,"(Sinónimos: adición, extensión)"
+policies,Noun,,,
+policies,Verb,,,
+policy,Noun,,,
+policymakers,,,,
+popup,Noun,,,
+popup window,Noun,,,
+port,Noun,[Signal] [Globaleaks] [Orbot],puerto,https://es.wikipedia.org/wiki/Puerto_de_red
+portable,Adjective,,,
+postponed,Adjective,[Globaleaks],,
+predecessor attack,Noun,,,
+preenchido,,,,
+preference,Noun,[Globaleaks],,
+preferences,Noun,[Globaleaks] [Signal],Preferencias,
+preferences page,Noun,[Globaleaks],,
+preferred,,,,
+prevent,,,,
+prevent,Verb,,,
+prevents,,,,
+preview,Noun,[Globaleaks],,
+preview,Verb,[Signal],,
+privacy,,,,
+privacy,Noun,[Signal] [Orbot],privacidad,
+privacy advocates,,,,
+privacy notice,Noun,,,
+privacy officer,Noun,,,
+privacy-enhancing,,,,
+private,,,,
+private,Adjective,,,
+private browsing,,,,
+private key (secret key),Noun,,clave privada,
+privoxy,Noun,,,
+probing,Verb,,,
+process,,,,
+process,Noun,,,
+process,Verb,[Signal],,
+processed,Adjective,,,
+processor,,,,
+profile,Noun,[Signal],,
+program,Noun,,,
+proof,Noun,,,
+proofs,Noun,,,
+properly,Adverb,,,
+protects,,,,
+protocol,Noun,"[Orbot] A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called ""http"". Some protocols use encryption to protect their contents. The secure version of the http protocol is called ""https"". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure  messaging. (Source EFF)",protocolo,"Un protocolo de comunicaciones es una manera de enviar data entre programas o computadoras. Los programas de software que utilizan el mismo protocolo pueden conversar entre ellos: digamos, los navegador web y los servidores hablan con el mismo protocolo llamado ""http"". Algunos protocolos usan cifrado para proteger sus contenidos. La versión segura de protocolo http se llama ""https"". Otro ejemplo de un protocolo cifrado utilizado por otros diferentes programas es el
  OTR (Off The Record/Fuera de Record), un protocolo para mensaje seguro instantáneo."
+prototype,Noun,,prototipo,
+provide,,,,
+provider,Noun,,,
+providers,,,,
+proxied,Adjective,,,
+proxied site,Noun,,,
+proxy,Noun,[Orbot],proxy,"""Un proxy, o servidor proxy, en una red informática, es un servidor —programa o dispositivo—, que hace de intermediario en las peticiones de recursos que realiza un cliente (A) a otro servidor (C). Por ejemplo, si una hipotética máquina A solicita un recurso a C, lo hará mediante una petición a B, que a su vez trasladará la petición a C; de esta forma C no sabrá que la petición procedió originalmente de A. Esta situación estratégica de punto intermedio le permite ofrecer diversas funcionalidades: control de acceso, registro del tráfico, restricción a determinados tipos de tráfico, mejora de rendimiento, anonimato de la comunicación, caché web, etc. Dependiendo del contexto, la intermediación que realiza el proxy puede ser considerada por los usuarios, administradores o proveedores como legítima o delictiva y su uso es frecuentemente discutido."" (Fuente: https://es.wikipedia.org/wiki/Servidor_proxy)"
+proxy,Verb,[Orbot],proxyficar,
+proxy test,Noun,,,
+proxychains,,,,
+public account ID,Noun,The Martus account's public identifier,Identificación pública de cuenta,
+public code,Noun,,Código público,
+public key,Noun,,clave pública,
+public key / public account key,Noun,[Martus] The Martus account's public key,Clave pública / Clave pública de cuenta,
+public key infrastructure,Noun,,,
+publicly,,,,
+publish,,,,
+publish,Verb,,,
+pull,Noun,9,,
+pull,Verb,"In the context of commits (GitHub, GitLab etc.)",,
+purpose,,,,
+push framework,Noun,[Signal],,
+push notification,Noun,[Signal],,
+quality-wise,,,,
+qube,Noun,[QubesOS] A user-friendly term for a VM in Qubes OS.,qube,"Since this concept is closely related to the actual product name, it is kept untranslated, but a proper explanation when appropriate is recommended"
+question,Verb,,,
+questionaire,Noun,,,
+queue,Verb,"To form or wait in a line. ""Queued"" messages may be waiting to be sent for example. [Signal]",,
+quit,Verb,[Signal],,
+range,,,,
+range,Noun,[Globaleaks],,
+read receipt,Noun,[Signal],notificación de lectura,
+read-only,Adjective,,,
+reader,Noun,,,
+receipt,,,,
+receipt,Noun,[Globaleaks],,
+receive,Verb,,,
+receiver,Noun,,receptor,
+recipient,Noun,[Globaleaks] [Signal],,
+recommend,,,,
+recommend,Verb,,,
+reconnect,Verb,,,
+record,Noun,,Expediente,
+record,Verb,,"registrar, grabar",
+records,,,,
+recover,Verb,"Recover data, an account, etc.",recuperar,
+recover an amount,Verb,"Recover money that you have spent, invested, or lent, you get the amount back.",,
+redact,,,,
+redacted,Verb,,,
+reenter,Verb,,,
+referral code,Noun,,,
+refund,,,,
+refunded,,,,
+register,Verb,,,
+regular,Adjective,,regular,
+regular expression,Noun,,,
+reinstall,Verb,[Signal],,
+reject,,,,
+relay,,,,
+relay,Noun,[Orbot],repetidor,
+relay,Verb,[Signal],,
+relay directory,Noun,,directorio de repetidores,
+relay node,Noun,[Orbot],nodo de repetidor,
+relays,,,,
+relays,Noun,,,
+release,Noun,,,
+release,Verb,,,
+release candidate,Noun,,,
+release notes,Noun,[Signal],,
+relink,Verb,[Signal],,
+reload,,,,
+reload,Verb,[Globaleaks],,
+rely,,,,
+remaining,Adjective,,,
+remains,,,,
+remove,Verb,,,
+rename,Verb,,,
+render,Verb,,,
+rendering,Adjective,,,
+rendering,Noun,,,
+rent,,,,
+report,,,,
+report,Noun,[Globaleaks],,
+report,Verb,[Signal],,
+reporting,,,,
+repository,Noun,,,
+request,,,,
+request,Noun,[Globaleaks],solicitar,
+request,Verb,,,
+required,,,,
+required fields,,,,
+requires,,,,
+rescan,Verb,,,
+research,,,,
+researchers,,,,
+resend,Verb,,,
+reserve,,,,
+reset,Noun,,restablecimiento,
+reset,Verb,[Globaleaks] [Signal] [Orbot],restablecer,
+resolver,Noun,,,
+resources,,,,
+restart,Noun,,,
+restart,Verb,[Globaleaks] [Signal] [Orbot],reiniciar,
+restore,Verb,[Signal] [Orbot],restaurar,
+restrict,,,,
+restricted route,Noun,,,
+restriction,Noun,,,
+retained,Verb,,,
+retrieve,Verb,(from server),descargar,
+review,Verb,,,
+revision,Noun,,,
+revokation certificate,Noun,,,
+revoke,Verb,,revocar,
+revoke ,Verb,,revocar,
+revoked,Adjective,,,
+ring,Verb,[Signal],,
+rip,Verb,,,
+robust,,,,
+role,Noun,[Globaleaks],,
+rooftop,Noun,,azotea,
+room,Noun,,,
+root,Adjective,,,
+root,Verb,,,
+root domain,Noun,,,
+"root, root directory",Noun,[Orbot],"raíz, directorio raíz",
+route,Noun,,,
+route,Verb,[Orbot],enrutar,"(wikipedia usa encaminar, pero encaminamiento no nos gustó)"
+router,Noun,,,
+router console,Noun,,,
+router console ,Noun,,,
+routing,Noun,,enrutamiento,
+row,Noun,,,
+rule,Noun,,,
+ruleset,Noun,,,
+run,,,,
+run,Verb,,,
+running,,,,
+safe,,,,
+safely,,,,
+safely,Adverb,,,
+safety number,Noun,[Signal],,
+sandbox,Noun,,,
+sanitize,Verb,,,
+save,Verb,[Globaleaks],guardar,
+scale,Verb,[Signal],,
+scan,Verb,[Orbot],escanear,
+scope,Noun,[Globaleaks],,
+score,Noun,,,
+scour,Verb,,,
+scramble,Verb,,,
+scroll,Verb,[Signal],,
+scroll bar,Noun,,,
+search,,,,
+search,Verb,[Signal],buscar,
+search engine,Noun,[Orbot],motor de búsqueda,
+search index,Noun,,,
+search provider,Noun,,,
+second,Noun,,segundo,
+secure,,,,
+secure,Adjective,[Signal] [Orbot],segura,Masculino: seguro
+secure,Verb,[Signal],,
+secureApp,Noun,Name of the application.,,
+securely,Adverb,,,
+security,,,,
+security,Noun,[Orbot],seguridad,
+security background,Noun,,historial de seguridad,
+security level,Noun,,nivel de seguridad,
+security log,Noun,,,
+security vulnerability,Noun,,,
+seed,Verb,,,
+select,Verb,,seleccionar,
+selected,Adjective,,"seleccionado, -a",
+selection,Noun,,selección,
+selector,Noun,[Globaleaks] [Signal],,
+sell,,,,
+sell,Verb,,,
+send,Verb,,enviar,
+sender,Noun,[Signal],,
+separate,Adjective,,"seperado, -a",
+separate,Verb,,,
+server,Noun,[Globaleaks] [Signal] [Orbot],servidor,
+service,Noun,,servicio,
+service provider,Noun,,,
+session,Noun,[Signal],sesión,
+set,Noun,,,
+set,Verb,,establecer,Sinónimo: fijar
+set up,,,,
+set up,Verb,,configurar,
+setting,Verb,"P.Ex. ""Error setting new password""",,
+setup,Noun,,configuración,
+share,,,,
+share,Noun,,,
+share,Verb,,compartir,
+shortly,,,,
+shovel coal,,,,
+shovel coal (slang word),,,,
+show,Verb,,mostrar,
+shown,Verb,,,
+shut down,Verb,,apagar,
+shutdown,Noun,,apagar,
+shutting down,Verb,[Globaleaks],,
+sidebar,Noun,,barra lateral,
+sideload,Verb,x,,
+sign,Noun,,,
+sign,Verb,,firmar,
+sign in,Verb,[Globaleaks],iniciar sesión,
+sign out,Verb,,cerrar sesión,
+sign up,,,,
+signature,Noun,,firma,
+signed,Adjective,,"firmado, -a",
+signing key,Noun,,,
+signup form,Noun,,,
+similar,,,,
+single,,,,
+site,Noun,Website,sitio,Sinónimo: lugar
+site operator,Noun,,,
+size,,,,
+size,Noun,,tamaño,
+sizing up,,,,
+slider,Noun,[Signal],,
+small,,,,
+smartphone,Noun,,,
+snail mail,,,,
+software,,,,
+software,Noun,[Globaleaks] [Signal],,
+source,,,,
+source,Noun,[Globaleaks],fuente,
+spam,Noun,,,
+specific,,,,
+specified,,,,
+specify,Verb,,,
+spend,,,,
+spends,,,,
+spin,Verb,,,
+split,Verb,,,
+split GPG,Noun,"""Split GPG"" is the name of a feature. For reference: https://www.qubes-os.org/doc/split-gpg/",Separación de GPG,"Cuando se refiere a la función específica de Qubes, se mantiene sin traducir. Cuando se trata de explicar el concepto, se propone usar Separación de GPG (¿Podría ser GPG Separado?)."
+split bar,Noun,,,
+split package,Noun,,,
+sponsor,Noun,,,
+sponsor,Verb,,,
+spoof,Verb,,,
+spoofing,Noun,,,
+spooled,Adjective,[Globaleaks] context: spooled emails,,
+spreadsheet,Noun,,,
+staff,,,,
+staffing,,,,
+standalone,Adjective,[Signal],independiente,
+standard,Adjective,[Orbot],estándar,
+standard,Noun,,,
+start,Noun,,"comienzo, principio",
+start,Verb,[Globaleaks],"comenzar, empezar, arrancar",
+startup,Noun,,arrancar,
+state,Noun,,,
+statements,,,,
+statistics,Noun,,estadísticas,
+status,,,,
+status,Noun,[Globaleaks],estado,
+stay,Verb,,,
+stay in,Verb,,,
+sticker,Noun,[Signal],,
+stickers,,,,
+stolen,,,,
+stop,Verb,,,
+storage,Noun,[Signal],almacenamiento,
+stream,Noun,,flujo,
+streaming library,Noun,,,
+strip,Verb,,remover,"Si bien ""strip"" es literalmente ""desnudar"", en el contexto es equivalente al español ""remover"", parecido al significado de ""strip"" en ""strip the clothes"" (quitarse la ropa), ""strip the key"" sería ""remover/quitar la clave""."
+stuff,,,,
+subject,Noun,[Globaleaks],sujeto,
+subkey,Noun,,subclave,
+subkeys,Noun,,,
+submission,Noun,[Globaleaks],sumisión,
+submit,Verb,[Signal],someter,
+submitter,Noun,[GlobaLeaks],,
+submitting,,,,
+subscription,Noun,,suscripción,
+substatus,Noun,[GlobaLeaks],,
+such as,,,,
+suggested,Adjective,,,
+suggestion,Noun,,,
+suitable,Adjective,,,
+summary,,,,
+summary,Noun,,Resúmen,
+summary_large_image,,,,
+superuser,Noun,Synonym: root,,
+support,Noun,"[Signal] As in ""support page"" or ""customer support.""",asistencia,(Sinónimo: soporte)
+support,Verb,,asistir,(Sinónimo: soportar)
+support portal,Noun,,,
+supported,Adjective,,asistido,(Con ayuda o soporte técnico)
+supporting,,,,
+surveillance,,,,
+surveillance,Noun,[Orbot],vigilancia,
+sustainability,,,,
+sustainability,Noun,,,
+swarm,Noun,,,
+swipe,Verb,"Swipe up, swipe down [Signal]",,
+switch,Noun,,,
+sync,Verb,[Signal],,
+synthesis,Noun,Repaso y conclusión. En plural es Síntesis también.,síntesis,
+sys-firewall,Noun,,,
+system log,Noun,,,
+system's clock,Noun,,,
+t-shirt,,,,
+tab,Noun,,,
+tackle ambitious projects,,,,
+tag,Noun,,nombre de indentificación,
+tag,Verb,,,
+tagging attack,Conjunction,http://www.i2p2.de/how_threatmodel.html#tagging,,
+tap,Verb,,pulsar,
+tap to explore,Verb,,,
+tarball,Noun,,,
+target,Noun,,objetivo,
+taskbar,Noun,,barra de tareas,
+tax-deductibility,,,,
+tax-deductible,,,,
+tax-exempt,,,,
+taxes,,,,
+team,Noun,,,
+template,Noun,[Globaleaks],plantilla,"Inicialmente, consideramos ""plantilla"", pero en algunos países de LATAM tiene una connotación demasiado física, como stencil, se propuso ""modelo"". Volvimos a plantilla basandonos en diferentes glosarios existentes."
+template-based VM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which depends on a TemplateVM for its root filesystem.",máquina virtual basada en una plantilla,"Este término al parecer se utiliza solo para explicar que hay diferentes orígenes para un AppVM, por lo que puede traducirse."
+templates,Noun,,,
+terminal,Noun,,,
+terms of service,Noun,,,
+test bed,Noun,,,
+tethering,Noun,[Orbot],tethering,"""Se denomina anclaje a red o tethering al proceso por el cual un dispositivo móvil con conexión a Internet actúa como pasarela para ofrecer acceso a la red a otros dispositivos, cualesquiera que estos sean, asumiendo dicho dispositivo móvil un papel similar al de un módem o enrutador inalámbrico."" (Fuente: https://es.wikipedia.org/wiki/Tethering)"
+text,Noun,,,
+text area,Noun,,área de texto,
+text format,Noun,,formato de texto,
+thank-you,,,,
+thanks,,,,
+theme,Noun,[Signal],temática,
+third-party,Adjective,,,
+third-party service,,,,
+third-party service providers,,,,
+thread,Noun,"A message ""thread"" is also a ""conversation""",,
+threat model,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat modeling) (Source: EFF)",,
+thresholds,Noun,,,
+throttling,Noun,,,
+thumbnail,Noun,[Signal],,
+thumbs up icon,Noun,"As in the emoji called by ""(y)"" or "":thumbsup:""",,
+ticket,Noun,,,
+time out,Verb,,,
+timeout,Noun,[Signal],Expiración,
+timer,Noun,"in computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). Source EFF.",,
+timestamp,Noun,"[Signal] Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF)",marca de tiempo,
+timezone,Noun,,,
+timing attack,Noun,,,
+tip,Noun,[Globaleaks] [Signal],Consejo,
+title,Noun,[Signal],título,
+title bar,Noun,,,
+to,Adverb,,,
+to ,Adverb,,,
+to stand up,,,,
+toggle,Noun,,,
+toggle,Verb,To switch back and forth between two options (ex: on/off) [Signal],Activar / Desactivar,
+token,,,,
+token,Noun,,Credencial,
+tool,Noun,,,
+tool ,,,,
+toolbar,Noun,[Orbot],barra de tareas,
+tools,Noun,,herramientas,
+torification,Noun,[Orbot],torificación,
+torify,Verb,[Orbot],torificar,
+tortification,Noun,,torificación,
+towards,,,,
+track,,,,
+tracker,Noun,,,
+tracking,Noun,,,
+trade,,,,
+traffic,,,,
+traffic,Noun,[Orbot],tráfico,
+traffic analysis attack,Conjunction,,,
+traffic analysis attack,Noun,[Orbot],,
+traffic-blocking browser extension,Noun,"When you visit a website, your browser sends some information to that site's operators -- your IP address, other information about your computer, and cookies that link you to previous visits using that browser, for instance. If the website includes images and content taken from other web servers, that same information is sent to other websites as part of downloading or viewing the page. Advertising networks, analytics providers, and other data collectors may gather information from you in this way.
+You can install additional software that runs alongside your browser and will limit how much information is leaked to third-parties in this way. The most well-known examples are programs that block advertisements. EFF offers a tool called Privacy Badger which is another traffic-blocking extension.
+Source EFF.",,
+trainer,Noun,,"entrenador, -a",
+training,Noun,"(awareness raising session - concientización, sensibilización)","entrenamiento, capacitación, formación, talleres",
+transparent,Adjective,,,
+transport encryption,Noun,"Encrypting data as it travels across the network, so that others spying on the network cannot read it.
+Synonyms: transport-layer encryption.
+Source EFF.",,
+transport layer encryption,Noun,"Encrypting data as it travels across the network, so that others spying on the network cannot read it.
+Synonyms: Transport encryption.
+Source EFF.",,
+transport layer security,Noun,"The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
+Synonyms: Secure Sockets Layer (SSL).
+Source EFF.",,
+trash,Noun,,,
+trashcan icon,Noun,,,
+tray,Noun,,,
+triggered,,,,
+troubleshooting,Noun,,,
+trust,Noun,,,
+trust,Verb,,,
+trust on first use,Noun,"TOFU, https://en.wikipedia.org/wiki/Trust_on_first_use",,
+tunnel,Noun,,túnel,
+tunnel,Verb,,,
+tunneling,Adjective,,,
+tunneling,Noun,,,
+turn off,Verb,,desactivar,
+turn on,Verb,,activar,
+tweet,Noun,,,
+tweet,Verb,,,
+two-factor authentication (2FA),Noun,"""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",,
+two-step verification,Noun,"""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication. (Synonyms: Two-factor authentication, multi-factor authentication) (Source EFF)",autenticación de dos factores,
+type,Noun,,,
+type,Verb,,,
+unable,Adjective,[Globaleaks],,
+unabled,Adjective,,incapaz,
+unavailable,Adjective,[Globaleaks],no disponible,
+unblock,Verb,[Signal],,
+uncheck,Verb,,,
+unchoke,Verb,,,
+undelete software,Noun,"Most devices let you delete data from them; For instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone. Undelete programs are applications that can be used by the device's owner, or others with access to the device, to restore some data. Undelete programs are useful for those who accidentally delete their own data, and to those whose data might have been sabotaged, such as a photographer who has been compelled to remove images from their camera. However, those same programs can be a threat to anyone who wants to permanently erase confidential data.
+Source EFF.",,
+undo,Verb,,,
+unexpected,Adjective,,inesperado,
+unfollow,Verb,,,
+uninstall,Verb,,desinstalar,
+unit test,Noun,http://en.wikipedia.org/wiki/Unit_test,,
+unknown,Adjective,,"desconocido, -a",
+unless,,,,
+unlink,Verb,[Signal],,
+unlock,Verb,,,
+unlocked,Adjective,,,
+unmount device,Verb,,desmontar dispositivo,
+"unmount, unmounting",Verb,,desmontar,
+unpack,Verb,,desempaquetar,
+unparseable,Adjective,,,
+unpin,Verb,"Unpin a tab, a site in a browser.",,
+unreachable,Adjective,,inalcanzable,
+unrecognized,Adjective,,irreconocible,
+unrecognized ,Adjective,,,
+unrestricted,,,,
+unsafe,Adjective,,"inseguro, -a",
+untrusted,Adjective,,,
+up-to-date,Adjective,,está-al-día,
+update,,,,
+update,Noun,[Signal],actualizador,
+update,Verb,[Signal],actualizar,
+updates,,,,
+upgrade,Noun,[Signal],,
+upgrade,Verb,[Signal],,
+upload,Noun,[Globaleaks] [Orbot],subida,
+upload,Verb,[Globaleaks] [Orbot],subir,
+uploader,Noun,,,
+uploading,Noun,,,
+upstream proxy,Noun,,,
+uptime,Noun,,,
+user,Noun,,usuario,
+user ID,Noun,user identification,identificación de usuario,
+user agent,Noun,,,
+user data,Noun,,datos de usuario,
+user guide,Noun,,Guía de usuario,
+user manual,Noun,,manual de usuario,
+user settings,Noun,,Configuraciones de usuario,
+username,,,,
+username,Noun,[Globaleaks] [Orbot],nombre de usuario,
+users,,,,
+validation,,,,
+variable,Noun,,variable,
+"vcard, v-card",Noun,,,
+verification,Noun,[Signal],verificación,
+verified,Adjective,[Signal],"verificado, -a",
+verify,Verb,[Signal],,
+version,Noun,[Signal],,
+version,Verb,Create a new version of a record or file while still maintaining past versions of the file.,versión,
+versioned,Adjective,,versionad@,
+video chat,Noun,,,
+view,Noun,,visión,
+view,Verb,,ver,
+viewport,Noun,,,
+volume,Noun,,volumen,
+volunteer,Noun,,voluntario,
+volunteers,,,,
+vulnerability,Noun,,vulnerabilidad,
+vulnerable,Adjective,,vulnerable,
+wallet,Noun,,cartera,
+warning,Noun,,advertencia,
+watch,Verb,,,
+watch list,Noun,,,
+watching,,,,
+watermark,Noun,,,
+wear leveling,Noun,"Some forms of digital storage, like the flash memory used in solid-state drives (SSD) and USB sticks, can wear out if overwritten many times. Wear leveling is a method that spreads the writing of data evenly across all of the media to prevent one part of it being overwritten too many times. Its benefit is that it can make devices last longer. The danger for security-conscious users is that wear leveling interferes with secure erase programs, which deliberately try to overwrite sensitive files with junk data in order to permanently erase them. Rather than trusting secure erase programs with files stored on SSD or USB flash drives, it can be better to use full-disk encryption. Encryption avoids the difficulty of secure erasing by making any file on the drive difficult to recover without the correct passphrase.
+Source EFF.",,
+web,Noun,,,
+web browser,Noun,[Orbot],navegador web,
+web connectivity,Noun,,conectividad de la Web,
+"web connectivity, connectivity",Noun,[Orbot],conectividad de la Web,
+web interface,Noun,,interfaz de Web,
+webmail provider,Noun,,proveedor de correo electrónico,
+webserver,Noun,,,
+website,,,,
+website,Noun,,página web,
+week,Noun,,,
+which,,,,
+whistleblower,Noun,[Globaleaks],,
+whistleblowing,Noun,[Globaleaks],,
+whitelist,Noun,,,
+whole device,Noun,As in “whole device encryption.”,,
+wildcards,Noun,,,
+window,Noun,,ventana,
+wipe,Verb,,,
+wizard / assistant,Noun,A “getting started” wizard / assitant,Asistente de configuración,
+work,,,,
+work,Verb,,trabajar,
+work-around,Noun,,,
+works,,,,
+world wide web,Noun,,,
+world-leading,,,,
+wrapper,Noun,,,
+x,Noun,,,
+year,Noun,,año,
+yes,Noun,,sí,
+you,,,,
+zero day,Noun,"A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers hear of the flaw and fix it, attackers can use it for their own purposes.
+Source EFF.",,
+zip,Verb,To compress a file or directory so that is is smaller in size. [Signal],,
+βασικό,,,,
+βασικό,Adjective,,,
+εγκαθιστώ,Verb,,,
+…,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",...,



More information about the tor-commits mailing list