Compare commits

...

45 commits

Author SHA1 Message Date
Jaz-Michael King 023c8aa086
Merge pull request #16 from iftas-org/l10n_main2
New Crowdin updates
2025-02-20 07:37:50 -05:00
Jaz-Michael King e9f5b63f8f New translations counterfeit (Turkish) 2025-01-19 12:08:13 -05:00
Jaz-Michael King ef75ea3318 New translations copyright infringement (Turkish) 2025-01-19 12:08:12 -05:00
Jaz-Michael King 2bd8d14b31 New translations account takeover (Turkish) 2025-01-19 12:08:11 -05:00
Jaz-Michael King b2281796c0 New translations brigading (Spanish) 2025-01-17 11:35:31 -05:00
Jaz-Michael King 22a1b45f41 New translations astroturfing (Spanish) 2025-01-17 11:35:30 -05:00
Jaz-Michael King 3ad2003443 New translations account takeover (Spanish) 2025-01-17 11:35:29 -05:00
Jaz-Michael King 3fefebb777 New translations phishing (Scottish Gaelic) 2025-01-17 10:05:33 -05:00
Jaz-Michael King b97a5a7b35 New translations phishing (Bengali) 2025-01-17 10:05:32 -05:00
Jaz-Michael King 4a53a98db4 New translations phishing (Portuguese, Brazilian) 2025-01-17 10:05:31 -05:00
Jaz-Michael King 1e743641c2 New translations phishing (Vietnamese) 2025-01-17 10:05:30 -05:00
Jaz-Michael King 6d890b910a New translations phishing (Chinese Simplified) 2025-01-17 10:05:29 -05:00
Jaz-Michael King 0f304f15b0 New translations phishing (Turkish) 2025-01-17 10:05:27 -05:00
Jaz-Michael King 67329b15ba New translations impersonation (Turkish) 2025-01-17 10:05:26 -05:00
Jaz-Michael King ed9fe4a81b New translations hate speech (Turkish) 2025-01-17 10:05:25 -05:00
Jaz-Michael King 5ae61022b8 New translations glorification of violence (Turkish) 2025-01-17 10:05:24 -05:00
Jaz-Michael King 36c65c07fc New translations account takeover (Turkish) 2025-01-17 10:05:21 -05:00
Jaz-Michael King 73d32a0b70 New translations phishing (Russian) 2025-01-17 10:05:20 -05:00
Jaz-Michael King d920e05d0d New translations phishing (Portuguese) 2025-01-17 10:05:19 -05:00
Jaz-Michael King c55036af4c New translations phishing (Polish) 2025-01-17 10:05:17 -05:00
Jaz-Michael King 9efa90a1b1 New translations phishing (Dutch) 2025-01-17 10:05:16 -05:00
Jaz-Michael King 693a1d7b46 New translations synthetic media (Dutch) 2025-01-17 10:05:15 -05:00
Jaz-Michael King 3a06672cb3 New translations misinformation (Dutch) 2025-01-17 10:05:13 -05:00
Jaz-Michael King 5477a41012 New translations glorification of violence (Dutch) 2025-01-17 10:05:12 -05:00
Jaz-Michael King e6ca0913ff New translations disinformation (Dutch) 2025-01-17 10:05:11 -05:00
Jaz-Michael King bf613e4a04 New translations counterfeit (Dutch) 2025-01-17 10:05:10 -05:00
Jaz-Michael King 8913bd5261 New translations copyright infringement (Dutch) 2025-01-17 10:05:09 -05:00
Jaz-Michael King 0b96415e4c New translations content- and conduct-related risk (Dutch) 2025-01-17 10:05:08 -05:00
Jaz-Michael King 6e25ede144 New translations brigading (Dutch) 2025-01-17 10:05:07 -05:00
Jaz-Michael King 3c9158877b New translations account takeover (Dutch) 2025-01-17 10:05:05 -05:00
Jaz-Michael King 54376c7e01 New translations phishing (Korean) 2025-01-17 10:05:04 -05:00
Jaz-Michael King 1bd5af5827 New translations phishing (Japanese) 2025-01-17 10:05:03 -05:00
Jaz-Michael King 0da3d3add9 New translations spam (Japanese) 2025-01-17 10:05:02 -05:00
Jaz-Michael King 3fef6386d8 New translations account takeover (Japanese) 2025-01-17 10:05:01 -05:00
Jaz-Michael King de772ec1f9 New translations phishing (Italian) 2025-01-17 10:05:00 -05:00
Jaz-Michael King ff31e4a4a1 New translations phishing (German) 2025-01-17 10:04:58 -05:00
Jaz-Michael King c270cb1cf3 New translations misinformation (German) 2025-01-17 10:04:57 -05:00
Jaz-Michael King 5e247ebb19 New translations hate speech (German) 2025-01-17 10:04:56 -05:00
Jaz-Michael King 3802d464e7 New translations doxxing (German) 2025-01-17 10:04:55 -05:00
Jaz-Michael King 501e594005 New translations copyright infringement (German) 2025-01-17 10:04:54 -05:00
Jaz-Michael King 2026119d1f New translations coordinated inauthentic behavior (German) 2025-01-17 10:04:52 -05:00
Jaz-Michael King fd059b13c8 New translations account takeover (German) 2025-01-17 10:04:51 -05:00
Jaz-Michael King afbf31b00a New translations phishing (Arabic) 2025-01-17 10:04:51 -05:00
Jaz-Michael King dae446c226 New translations phishing (Spanish) 2025-01-17 10:04:50 -05:00
Jaz-Michael King baebdf5a13 New translations phishing (French) 2025-01-17 10:04:47 -05:00
43 changed files with 62 additions and 28 deletions

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Kontoübernahme
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Coordinated Inauthentic Behavior
Koordiniertes unauthentisches Verhalten
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Urheberrechtsverletzung
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Doxxing
Doxxen
The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent.

View file

@ -1,4 +1,4 @@
Hate Speech
Hassrede
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Misinformation
Fehlinformationen
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Toma de control de cuenta
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
El escenario en el que un usuario no autorizado adquiera el control de una cuenta de usuario, a través de medios tales como hacking, phishing o compra de credenciales filtradas.

View file

@ -1,3 +1,3 @@
Astroturfing
Campaña de simulación
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.

View file

@ -1,4 +1,4 @@
Brigading
Intervención coordinada
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
アカウントの乗っ取り
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Spam
スパム
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Account overname
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Brigading
Georganiseerde aanval
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk
Risico's gerelateerd aan inhoud en gedrag
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Auteursrechtenschending
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit
Vervalsing
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Disinformation
Disinformatie
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.

View file

@ -1,4 +1,4 @@
Glorification of Violence
Glorificatie van geweld
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Misinformation
Misinformatie
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,4 +1,4 @@
Synthetic Media
Synthetische Media
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account Takeover
Hesap Devralma
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
Yetkisiz bir kullanıcının bilgisayar korsanlığı, kimlik avı veya sızdırılmış kimlik bilgilerini satın alma gibi yöntemlerle bir kullanıcı hesabının kontrolünü ele geçirdiği senaryo.

View file

@ -1,4 +1,4 @@
Copyright Infringement
Telif Hakkı İhlali
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit
Sahte
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Glorification of Violence
Şiddeti yüceltme
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Hate Speech
Nefret Söylemi
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Impersonation
Kişisellleştirme
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1 +1,3 @@
Phishing
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。