Merge pull request #16 from iftas-org/l10n_main2

New Crowdin updates
This commit is contained in:
Jaz-Michael King 2025-02-20 07:37:50 -05:00 committed by GitHub
commit 023c8aa086
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
43 changed files with 62 additions and 28 deletions

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Kontoübernahme
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Coordinated Inauthentic Behavior
Koordiniertes unauthentisches Verhalten
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Urheberrechtsverletzung
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Doxxing
Doxxen
The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent.

View file

@ -1,4 +1,4 @@
Hate Speech
Hassrede
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Misinformation
Fehlinformationen
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Toma de control de cuenta
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
El escenario en el que un usuario no autorizado adquiera el control de una cuenta de usuario, a través de medios tales como hacking, phishing o compra de credenciales filtradas.

View file

@ -1,3 +1,3 @@
Astroturfing
Campaña de simulación
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.

View file

@ -1,4 +1,4 @@
Brigading
Intervención coordinada
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
アカウントの乗っ取り
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Spam
スパム
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Account overname
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Brigading
Georganiseerde aanval
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk
Risico's gerelateerd aan inhoud en gedrag
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Auteursrechtenschending
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit
Vervalsing
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Disinformation
Disinformatie
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.

View file

@ -1,4 +1,4 @@
Glorification of Violence
Glorificatie van geweld
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Misinformation
Misinformatie
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,4 +1,4 @@
Synthetic Media
Synthetische Media
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Hesap Devralma
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
Yetkisiz bir kullanıcının bilgisayar korsanlığı, kimlik avı veya sızdırılmış kimlik bilgilerini satın alma gibi yöntemlerle bir kullanıcı hesabının kontrolünü ele geçirdiği senaryo.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Telif Hakkı İhlali
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit
Sahte
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Glorification of Violence
Şiddeti yüceltme
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Hate Speech
Nefret Söylemi
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Impersonation
Kişisellleştirme
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。