Merge pull request #16 from iftas-org/l10n_main2

New Crowdin updates
This commit is contained in:
Jaz-Michael King 2025-02-20 07:37:50 -05:00 committed by GitHub
commit 023c8aa086
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
43 changed files with 62 additions and 28 deletions

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover Kontoübernahme
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Coordinated Inauthentic Behavior Koordiniertes unauthentisches Verhalten
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.

View file

@ -1,4 +1,4 @@
Copyright Infringement Urheberrechtsverletzung
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation. The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Doxxing Doxxen
The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent. The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent.

View file

@ -1,4 +1,4 @@
Hate Speech Hassrede
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Misinformation Fehlinformationen
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover Toma de control de cuenta
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. El escenario en el que un usuario no autorizado adquiera el control de una cuenta de usuario, a través de medios tales como hacking, phishing o compra de credenciales filtradas.

View file

@ -1,3 +1,3 @@
Astroturfing Campaña de simulación
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.

View file

@ -1,4 +1,4 @@
Brigading Intervención coordinada
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit. La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover アカウントの乗っ取り
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Spam スパム
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover Account overname
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Brigading Georganiseerde aanval
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk Risico's gerelateerd aan inhoud en gedrag
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.

View file

@ -1,4 +1,4 @@
Copyright Infringement Auteursrechtenschending
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation. The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit Vervalsing
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Disinformation Disinformatie
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.

View file

@ -1,4 +1,4 @@
Glorification of Violence Glorificatie van geweld
Statements or images that celebrate past or hypothetical future acts of violence. Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Misinformation Misinformatie
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,4 +1,4 @@
Synthetic Media Synthetische Media
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover Hesap Devralma
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. Yetkisiz bir kullanıcının bilgisayar korsanlığı, kimlik avı veya sızdırılmış kimlik bilgilerini satın alma gibi yöntemlerle bir kullanıcı hesabının kontrolünü ele geçirdiği senaryo.

View file

@ -1,4 +1,4 @@
Copyright Infringement Telif Hakkı İhlali
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation. The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit Sahte
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Glorification of Violence Şiddeti yüceltme
Statements or images that celebrate past or hypothetical future acts of violence. Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Hate Speech Nefret Söylemi
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Impersonation Kişisellleştirme
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them. Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。 伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。