French Localization Lab Unified Glossary: Difference between revisions
Jump to navigation
Jump to search
(Added French Glossary) |
No edit summary |
||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable sortable" style="border:1px solid #BBB" style="font-size:75%" | {| class="wikitable sortable" style="border:1px solid #BBB" style="font-size:75%" | ||
! | ! Terme | ||
! Type | |||
! Commentaire | |||
! Traduction fr | |||
! Commentaire fr | |||
|- | |- | ||
| ! | | ! | ||
| Conjunction | |||
| Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | |||
| ! | |||
| Précédé d’une espace fine | |||
|- | |- | ||
| " | | " | ||
| Conjunction | |||
| Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | |||
| « » | |||
| «Espace insécable…Espace insécable» | |||
|- | |- | ||
| | | $ | ||
| Noun | |||
| Dollar | |||
| | |||
| | |||
|- | |- | ||
| | | %s | ||
| Conjunction | |||
| Do not translate or change. This is a placeholder (ex: 2%s or 1%s) | |||
| %s | |||
| Ne pas traduire ni modifier. C’est un emplacement réservé (p. ex. 2%S ou 1%s). | |||
|- | |- | ||
| | | | ||
| Conjunction | |||
| &_nbsp_; [without underscores, Non-Breaking Space] | |||
| | |||
| espace insécable HTML | |||
|- | |- | ||
| | | 2-factor authentication | ||
| Noun | |||
| "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF) | |||
| authentification à deux facteurs | |||
| « Quelque chose que vous connaissez et quelque chose que vous avez ». Les systèmes d’authentification qui n’exigent qu’un nom d’utilisateur et son mot de passe risquent d’être percés si quelqu’un d’autre peut obtenir (ou deviner) ces informations. Les services qui offrent l’authentification à deux facteurs exigent aussi que vous fournissiez une confirmation séparée que vous êtes la personne que vous prétendez. La deuxième étape peut être un code secret à usage unique, un nombre généré par un programme qui fonctionne sur un appareil mobile ou un dispositif que vous portez, et qui peuvent être utilisés pour confirmer qui vous êtes. Des compagnies telles que les banques et les principaux services Internet comme Google, PayPal et Twitter offrent maintenant l’authentification à deux facteurs.Synonymes : A2F, validation en deux étapes, authentification multifacteur Source FFÉ. | |||
|- | |- | ||
| | | 24/7 | ||
| Noun | |||
| Twenty-four hours, seven days a week. This essentially means "all the time" (non stop). Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running. | |||
| jour et nuit | |||
| | |||
|- | |- | ||
| | | 2FA | ||
| Noun | |||
| Two-factor authenticationTwo-factor authentication"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: two-step verification, multi-factor authentication.Source EFF. | |||
| A2F | |||
| « Quelque chose que vous connaissez et quelque chose que vous avez ». Les systèmes d’authentification qui n’exigent qu’un nom d’utilisateur et son mot de passe risquent d’être percés si quelqu’un d’autre peut obtenir (ou deviner) ces informations. Les services qui offrent l’authentification à deux facteurs exigent aussi que vous fournissiez une confirmation séparée que vous êtes la personne que vous prétendez. La deuxième étape peut être un code secret à usage unique, un nombre généré par un programme qui fonctionne sur un appareil mobile ou un dispositif que vous portez, et qui peuvent être utilisés pour confirmer qui vous êtes. Des compagnies telles que les banques et les principaux services Internet comme Google, PayPal et Twitter offrent maintenant l’authentification à deux facteurs.Synonymes : A2F, validation en deux étapes, authentification multifacteurSource FFÉ. | |||
|- | |- | ||
| | | 3D bar chart | ||
| Noun | |||
| [Martus] | |||
| graphique à barres en 3D | |||
| | |||
|- | |- | ||
| | | 3rd party | ||
| Adjective | |||
| [Signal] As in “Use a 3rd party application.” | |||
| | |||
| | |||
|- | |- | ||
| | | : | ||
| Conjunction | |||
| Punctuation, not a conjunction, however “punctuation” is not an option in Transifex | |||
| : | |||
| Précédé d’une espace insécable | |||
|- | |- | ||
| | | ; | ||
| Conjunction | |||
| Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | |||
| ; | |||
| Précédé d’une espace fine | |||
|- | |- | ||
| | | ? | ||
| Conjunction | |||
| Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | |||
| ? | |||
| Précédé d’une espace fine insécable ? | |||
|- | |- | ||
| | | A reasonably secure operating system | ||
| Noun | |||
| [Qubes OS] This is the Qubes OS tagline. | |||
| Un système d’exploitation relativement sûr | |||
| [Qubes OS] Ceci est la signature du SE Qubes OS. | |||
|- | |- | ||
| | | A security-oriented operating system | ||
| Noun | |||
| [Qubes OS] | |||
| Un système d’exploitation axé sur la sécurité | |||
| [Qubes OS] | |||
|- | |- | ||
| | | ADIDS | ||
| Noun | |||
| ADIDS is an approach to education and training. It is an acronym that stands for: Activity, Discussion, Input, Deepening and Synthesis | |||
| | |||
| | |||
|- | |- | ||
| | | API | ||
| Noun | |||
| Application Programming Interface: "In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software." - Wikipedia | |||
| interface de programmation | |||
| synonymes : interface de programmation, interface API, interface de programmation d’application, interface de programmation d’applications, interface de programme d'application. | |||
|- | |- | ||
| | | APK | ||
| Noun | |||
| "Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10." https://en.wikipedia.org/wiki/Android_application_package | |||
| APK | |||
| Paquet applicatif Android. | |||
|- | |- | ||
| | | ASCII | ||
| Noun | |||
| [KeePassXC] | |||
| | |||
| | |||
|- | |- | ||
| | | About | ||
| Preposition | |||
| [Globaleaks, Outline] As in, the “About” section of a website or application. | |||
| à propos | |||
| | |||
|- | |- | ||
| | | Alice | ||
| Noun | |||
| [Briar] | |||
| | |||
| | |||
|- | |- | ||
| | | American Apparel | ||
| Noun | |||
| [Tor Web] This is a brand name. Do not translate. | |||
| | |||
| | |||
|- | |- | ||
| | | Android | ||
| Noun | |||
| [Signal] [Orbot] Operating system | |||
| | |||
| | |||
|- | |- | ||
| | | Anti Evil Maid | ||
| Noun | |||
| [Qubes OS] Do not translate. Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. (Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html) | |||
| Anti Evil Maid | |||
| [Qubes OS] Ne pas traduire.« Anti Evil Maid » est la mise en œuvre d’un amorçage fixe fiable fondé sur TPM (module de plateforme fiable) dont le but premier est de prévenir les attaques de type « Evil Maid ».Source : https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html | |||
|- | |- | ||
| | | App Store | ||
| Noun | |||
| Apple App Store [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | AppVM | ||
| Noun | |||
| [Qubes OS] "Application Virtual Machine"A VM which is intended for running software applications. | |||
| MVappli | |||
| [Qubes OS] « Machine virtuelle applicative ». Une MV dont la tâche est d’exécuter des programmes d’application. | |||
|- | |- | ||
| | | Apt. | ||
| Noun | |||
| Apt. is short hand for "apartment." This will appear in a form requesting a user's address. | |||
| | |||
| | |||
|- | |- | ||
| | | Autocrypt Setup Message | ||
| Noun | |||
| [Mailvelope, Enigmail, OpenKeychain] | |||
| message de configuration Autocrypt | |||
| [Enigmail, OpenKeychain et autres clients de courriel] | |||
|- | |- | ||
| | | BCC | ||
| Noun | |||
| "Blind carbon copy" | |||
| Cci | |||
| Copie conforme invisible | |||
|- | |- | ||
| | | Back to | ||
| Adverb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Benetech | ||
| Noun | |||
| Company name which should not be translated or transcribed. | |||
| Benetech | |||
| Nom de société que ne doit être ni traduit ni transcrit. | |||
|- | |- | ||
| | | BitTorrent | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | BitTorrent | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Bitcoin | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Bitcoin | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Blow the Whistle | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Blow the Whistle | ||
| Verb | |||
| [Globaleaks] GlobaLeaks catch phrase | |||
| lancer une alerte | |||
| | |||
|- | |- | ||
| | | Bob | ||
| Noun | |||
| [Briar] | |||
| | |||
| | |||
|- | |- | ||
| | | Bug | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | C&C | ||
| Noun | |||
| A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF. | |||
| serveur de commandement | |||
| Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. | |||
|- | |- | ||
| | | C2 | ||
| Noun | |||
| A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF. | |||
| serveur de commandement | |||
| Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. | |||
|- | |- | ||
| | | CAPTCHA | ||
| Noun | |||
| [Tor] CAPTCHA is always capitalized.Plural is CAPTCHAsIt means Completely Automated Public Turing Test To Tell Computers and Humans Apart. | |||
| captcha | |||
| L’acronyme signifie « Test de Turing public complètement automatisé » pour différencier les ordinateurs des utilisateurs humains (« Completely Automated Public Turing Test To Tell Computers and Humans Apart. »).L’acronyme est maintenant lexicalisé, considéré comme un nom commun et peut prendre la marque du pluriel au besoin. | |||
|- | |- | ||
| | | CFC program | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | CGI | ||
| Noun | |||
| [CGIProxy] Shorthand for "Common Gateway Interface". "In computing, Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications (also called command-line interface programs) running on a server that generates web pages dynamically." Wikipedia: https://en.wikipedia.org/wiki/Common_Gateway_Interface#Purpose_of_the_CGI_standard | |||
| | |||
| | |||
|- | |- | ||
| | | CGIProxy | ||
| Noun | |||
| [CGIProxy] Project name. Do not translate or transcribe. | |||
| | |||
| | |||
|- | |- | ||
| | | CIDR | ||
| Noun | |||
| [TunnelBear] Classless inter-domain routing | |||
| routage interdomaine sans classes | |||
| Synonyme : CIDR | |||
|- | |- | ||
| | | CPU | ||
| Noun | |||
| | |||
| UCT | |||
| Unité centrale de traitement | |||
|- | |- | ||
| | | CSR | ||
| Noun | |||
| Certificate Signing Request | |||
| DSC | |||
| Demande de signature de certificat | |||
|- | |- | ||
| | | CSRF | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | CVC | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Cancel | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Carol | ||
| Noun | |||
| [Briar] | |||
| | |||
| | |||
|- | |- | ||
| | | Certificate Signing Request | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ChatSecure | ||
| Noun | |||
| Application Name | |||
| ChatSecure | |||
| | |||
|- | |- | ||
| | | Chrome App | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | Chrome OS | ||
| Noun | |||
| | |||
| Chrome OS | |||
| | |||
|- | |- | ||
| | | Chrome Web Store | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Circuit Display | ||
| Noun | |||
| [Tor] | |||
| Affichage des circuits | |||
| [Tor] | |||
|- | |- | ||
| | | Clear | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Clearnet | ||
| Noun | |||
| | |||
| réseau visible | |||
| | |||
|- | |- | ||
| | | Client User Interface | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ClockVM | ||
| Noun | |||
| | |||
| MVhorloge | |||
| | |||
|- | |- | ||
| | | Cobian Backup | ||
| | |||
| | |||
| Cobian Backup (software) | |||
| | |||
|- | |- | ||
| | | Combined Federal Campaign | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Command-line tool | ||
| Noun | |||
| [CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations.Source EFF. | |||
| outil en ligne de commande | |||
| La « ligne de commande » est une façon de donner à un ordinateur une série de petits ordres autonomes. Pour utiliser un outil en ligne de commande, l’utilisateur tape une commande dans une fenêtre appelée émulateur de terminal, appuie sur la touche Retour ou Entrée et reçoit ensuite une réponse textuelle dans la même fenêtre. Les ordinateurs de bureau sous Windows, Linux et macOS peuvent encore exécuter des programmes en utilisant cette interface et, avec la bonne appli, même certains appareils mobiles peuvent le faire. La ligne de commande peut être utilisée pour exécuter des programmes livrés avec votre système d’exploitation. Certains programmes téléchargeables, particulièrement des utilitaires techniques, utilisent la ligne de commande au lieu d’une interface utilisateur plus familière composée d’icônes et de boutons. La ligne de commande exige que vous tapiez exactement la bonne suite de lettres et de chiffres pour obtenir le bon résultat, et il n’est parfois pas évident de savoir quoi faire si les réponses ne correspondent pas à vos attentes.Source FFÉ. | |||
|- | |- | ||
| | | Commit | ||
| Noun | |||
| | |||
| archivage | |||
| Dans un système de contrôle de versions, transmettre, valider et classer, dans un espace de travail commun, les modifications, dûment identifiées, apportées à des fichiers par un utilisateur, afin d'en permettre l'accès aux autres utilisateurs du système. | |||
|- | |- | ||
| | | Commit | ||
| Verb | |||
| | |||
| archiver | |||
| Dans un système de contrôle de versions, transmettre, valider et classer, dans un espace de travail commun, les modifications, dûment identifiées, apportées à des fichiers par un utilisateur, afin d'en permettre l'accès aux autres utilisateurs du système. | |||
|- | |- | ||
| | | Company | ||
| Noun | |||
| | |||
| Entreprise | |||
| Autres acceptions :Société (entreprise constituée ou non en société de capitaux),Compagnie (société de production de spectacles de théâtre ou de danse). | |||
|- | |- | ||
| | | Compass | ||
| Noun | |||
| [Tor] Compass is a web application to learn about currently running Tor relays in bulk. (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | Computer Engine | ||
| Noun | |||
| [Outline] Compute Engine is a product of Google Cloud Platform and should not be translated. | |||
| | |||
| | |||
|- | |- | ||
| | | Core | ||
| Noun | |||
| | |||
| noyau | |||
| Synonyme : cœur. | |||
|- | |- | ||
| | | Courier | ||
| Noun | |||
| [Courier] App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (كوريور) | |||
| | |||
| | |||
|- | |- | ||
| | | Crowdfunding | ||
| Noun | |||
| | |||
| financement participatif | |||
| | |||
|- | |- | ||
| | | Crypto | ||
| Adjective | |||
| | |||
| cryptographique | |||
| | |||
|- | |- | ||
| | | Crypto | ||
| Noun | |||
| This is an abbreviation of “cryptography.” | |||
| cryptographie | |||
| | |||
|- | |- | ||
| | | Customization Template Files (*.mct) | ||
| Noun | |||
| [Martus] | |||
| fichier de modèle de personnalisation (*.mct) | |||
| | |||
|- | |- | ||
| | | DD | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | DDoS | ||
| Noun | |||
| A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.Synonyms: distributed denial of serviceSource EFF | |||
| attaque par saturation | |||
| Une méthode pour mettre hors service un site Web ou autre service Internet en coordonnant de nombreux ordinateurs différents afin qu’ils lui demandent ou lui envoient simultanément des données. Habituellement, les ordinateurs utilisés pour mener une telle attaque sont contrôlés à distance par des criminels qui ont pris le contrôle des machines en les piratant ou en les infectant par un programme malveillant.Synonymes : attaque par déni de service, attaque par déni de service distribué, attaque par DDOS.Source FFÉ. | |||
|- | |- | ||
| | | DDoS (distributed denial of service) | ||
| Noun | |||
| A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF) | |||
| attaque par saturation | |||
| Une méthode pour mettre hors service un site Web ou autre service Internet en coordonnant de nombreux ordinateurs différents afin qu’ils lui demandent ou lui envoient simultanément des données. Habituellement, les ordinateurs utilisés pour mener une telle attaque sont contrôlés à distance par des criminels qui ont pris le contrôle des machines en les piratant ou en les infectant par un programme malveillant.Synonyme : attaque par déni de service, attaque par déni de service distribué, attaque par DDOS.Source FFÉ. | |||
|- | |- | ||
| | | DHT | ||
| Noun | |||
| | |||
| table de hachage distribuée | |||
| | |||
|- | |- | ||
| | | DNS | ||
| Noun | |||
| [TunnelBear] Domain Name Server | |||
| DNS | |||
| | |||
|- | |- | ||
| DNS | | DNS record | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| DVM | | DVM | ||
| Noun | |||
| [Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates. | |||
| MVJ | |||
| | |||
|- | |- | ||
| DVM Template | | DVM Template | ||
| Noun | |||
| [Qubes] TemplateBasedVMs on which DispVMs are based. | |||
| modèle de MVJ | |||
| | |||
|- | |- | ||
| Darknet | | Darknet | ||
| Noun | |||
| | |||
| réseau invisible | |||
| | |||
|- | |- | ||
| | | Data Collection Policy | ||
| Noun | |||
| [Outline] | |||
| | |||
| | |||
|- | |- | ||
| Data | | Data Retention Strategy | ||
| Noun | |||
| | |||
| stratégie de conservation des données | |||
| | |||
|- | |- | ||
| Data | | Data Source Grid | ||
| Noun | |||
| | |||
| grille de sources de données | |||
| | |||
|- | |- | ||
| | | Data-Driven Dropdown (Field) | ||
| Noun | |||
| [Matus] | |||
| | |||
| | |||
|- | |- | ||
| Date | | Date | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Debian-based Linux | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | Deflect | ||
| Noun | |||
| Don't translate this | |||
| | |||
| | |||
|- | |- | ||
| | | Device Management | ||
| Noun | |||
| | |||
| gestion des appareils | |||
| Autre acception : gestion des périphériques, des dispositifs | |||
|- | |- | ||
| | | Devtools | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | DigitalOcean | ||
| Noun | |||
| [Outline] Project name. Please do not translate or transcribe. | |||
| | |||
| | |||
|- | |- | ||
| | | DispVM | ||
| Noun | |||
| [QubesOS] "Disposable Virtual Machine"A temporary AppVM based on a DVM Template which can quickly be created, used, and destroyed. | |||
| MVjet | |||
| | |||
|- | |- | ||
| | | Distributed | ||
| Verb | |||
| | |||
| distribué | |||
| | |||
|- | |- | ||
| | | Distribution | ||
| Noun | |||
| As in "Linux distribution" | |||
| version | |||
| On parlera d’une version de Linux, non d’une distribution. | |||
|- | |- | ||
| | | Divice Management | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Dom0 | ||
| Noun | |||
| [QubesOS] "Domain Zero" Also known as the **host** domain, dom0 is the initial VM started by the Xen hypervisor on boot. | |||
| Dom0 | |||
| | |||
|- | |- | ||
| | | DomU | ||
| Noun | |||
| [QubesOS] "Unprivileged Domain"Also known as **guest** domains, domUs are the counterparts to dom0. | |||
| DomU | |||
| | |||
|- | |- | ||
| | | Donate | ||
| | |||
| | |||
| faire un don | |||
| | |||
|- | |- | ||
| | | Donate Page | ||
| | |||
| | |||
| page de don | |||
| | |||
|- | |- | ||
| | | Double-check | ||
| Verb | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | Drag and Drop | ||
| Noun | |||
| | |||
| glisser-coller | |||
| | |||
|- | |- | ||
| | | Drawer | ||
| Noun | |||
| A UI design pattern that consist on a lateral, hidden menu that can be brought into view usually by tapping an "hamburguer" icon or swiping from the left. | |||
| | |||
| | |||
|- | |- | ||
| | | DuckDuckGo | ||
| Noun | |||
| Name of an open source search engine. | |||
| DuckDuckGo | |||
| Nom d’un moteur de recherche à code source ouvert. | |||
|- | |- | ||
| | | Dump | ||
| Noun | |||
| | |||
| vidage | |||
| | |||
|- | |- | ||
| | | Dump | ||
| Verb | |||
| | |||
| vider | |||
| | |||
|- | |- | ||
| | | EC2 | ||
| Noun | |||
| [Outline] "Amazon Elastic Compute Cloud" Wikipedia: https://en.wikipedia.org/wiki/Amazon_Elastic_Compute_Cloud | |||
| | |||
| | |||
|- | |- | ||
| | | EPUB Reader | ||
| Noun | |||
| | |||
| liseuse EPUB | |||
| | |||
|- | |- | ||
| | | Eavesdropping | ||
| Noun | |||
| | |||
| écoute électronique | |||
| | |||
|- | |- | ||
| | | Edge | ||
| Noun | |||
| | |||
| extrémité | |||
| | |||
|- | |- | ||
| | | Edge server | ||
| Noun | |||
| | |||
| serveur d’extrémité | |||
| | |||
|- | |- | ||
| | | Email Subject | ||
| Noun | |||
| [Globaleaks] | |||
| objet d’un courriel | |||
| | |||
|- | |- | ||
| | | Encrypted | ||
| Verb | |||
| [Globaleaks] | |||
| chiffré | |||
| | |||
|- | |- | ||
| | | Ensure | ||
| Verb | |||
| | |||
| garantir | |||
| | |||
|- | |- | ||
| | | Enter | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Event | ||
| Noun | |||
| | |||
| événement | |||
| | |||
|- | |- | ||
| | | External drive | ||
| Noun | |||
| | |||
| lecteur externe | |||
| | |||
|- | |- | ||
| | | Extra text | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | FAI satellite | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | FAQ | ||
| Noun | |||
| [Orbot] “Frequently Asked Questions” | |||
| FAQ | |||
| Synonymes : questions fréquemment posées, questions fréquentes | |||
|- | |- | ||
| | | FOSS | ||
| Noun | |||
| Free and open-source software | |||
| | |||
| | |||
|- | |- | ||
| | | FTP (File Transfer Protocol) | ||
| Noun | |||
| [CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.Synonyms: FTP server, File Transfer Protocol. (Source: EFF) | |||
| protocole de transfert de fichiers | |||
| Une ancienne méthode pour copier les fichiers d’un ordinateur local vers un ordinateur distant ou vice-versa. Le travail des programmes FTP (et des serveurs FTP qui stockent les fichiers) a essentiellement été remplacé par les navigateurs et les serveurs Web, ou encore par des programmes de synchronisation des fichiers comme Dropbox.Synonyme : serveur FTP, FTP, protocole FTP.Source FFÉ. | |||
|- | |- | ||
| | | FTP data socket | ||
| Noun | |||
| [CGIProxy] | |||
| | |||
| | |||
|- | |- | ||
| | | FTP server | ||
| Noun | |||
| [CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer Protocol) (Source EFF) | |||
| serveur FTP | |||
| Une ancienne méthode pour copier les fichiers d’un ordinateur local vers un ordinateur distant ou vice-versa. Le travail des programmes FTP (et des serveurs FTP qui stockent les fichiers) a essentiellement été remplacé par les navigateurs et les serveurs Web, ou encore par des programmes de synchronisation des fichiers comme Dropbox.Synonyme : Protocole de transfert de fichiers, FTP, protocole FTP.Source FFÉ. | |||
|- | |- | ||
| | | Face ID | ||
| Noun | |||
| [Signal] Specific to iOS | |||
| | |||
| | |||
|- | |- | ||
| Fallback || | | Fallback | ||
| Adjective | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Fallback | ||
| Noun | |||
| [Orbot] [Globaleaks] | |||
| Repli | |||
| | |||
|- | |- | ||
| | | Favicon | ||
| Noun | |||
| A favicon, also known as a shortcut icon, website icon, tab icon, URL icon, or bookmark icon, is a file containing one or more small icons, associated with a particular website or web page. | |||
| | |||
| | |||
|- | |- | ||
| | | File hash value | ||
| Noun | |||
| A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.Synonyms: File fingerprint.Source EFF. | |||
| empreinte de fichier | |||
| Une séquence de lettres et de chiffres qui représente le contenu d’un fichier. Changer un fichier un tant soit peu modifiera complètement son empreinte. La vérification de l’empreinte d’un fichier que vous avez téléchargé, que ce soit un logiciel ou un greffon, contribue à garantir que vous avez obtenu le même fichier qu’autrui et que personne ne l’a altéré lors de son téléchargement.Synonyme : empreinte numérique, condensé numérique, condensat.Source FFÉ. | |||
|- | |- | ||
| | | File system | ||
| Noun | |||
| Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.Source EFF. | |||
| système de fichiers | |||
| Là où vos données sont enregistrées, habituellement localement sur votre ordinateur ou sur un autre appareil. Les documents personnels et les notes sont généralement enregistrés sur des systèmes de fichiers afin d’y accéder facilement.Source FFÉ. | |||
|- | |- | ||
| | | Firefox | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | FirewallVM | ||
| Noun | |||
| [Qubes] "Firewall Virtual Machine"A type of ProxyVM which is used to enforce network-level policies (a.k.a. "firewall rules"). | |||
| MVpare-feu | |||
| | |||
|- | |- | ||
| | | Firewalled | ||
| Adjective | |||
| | |||
| derrière un pare-feu | |||
| pare-feu est invariable | |||
|- | |- | ||
| | | Firmware | ||
| Noun | |||
| | |||
| micrologiciel | |||
| | |||
|- | |- | ||
| | | Fit | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Form | ||
| Noun | |||
| | |||
| formulaire | |||
| | |||
|- | |- | ||
| | | Form 990 | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Forward Secrecy | ||
| Noun | |||
| A property of a secure messaging system which ensures that your past communications can remain secure even if one of the secret keys is stolen later. Forward secrecy works by using the participant’s secret keys to generate a new key, which is only used for the current conversation and destroyed afterwards, rendering old messages impossible to decrypt. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.Synonyms: Perfect forward secrecy.Source: EFF. | |||
| confidentialité persistante | |||
| Une propriété d’un système sécurisé de messagerie qui garantit la sécurité de vos communications passées même si l’une des clés privées est volée ultérieurement. La confidentialité persistante fonctionne en utilisant les clés secrètes du participant pour générer une nouvelle clé qui n’est utilisée que pour la conversation en cours et qui est détruite par la suite, ce qui rend les anciens messages impossibles à déchiffrer. Pour les sites HTTPS, la confidentialité persistante est une protection importante contre des adversaires, tels que les agences de renseignement, qui pourraient enregistrer de grandes portions du trafic et utiliser une clé volée pour les déchiffrer. Pour les messageries instantanées et les systèmes de dialogue en ligne, la confidentialité persistante est nécessaire afin de garantir que les messages supprimés sont bel et bien supprimés. Vous devrez toutefois aussi soit désactiver la journalisation soit supprimer les anciens messages de façon sécuritaire.Source : FFÉ. | |||
|- | |- | ||
| | | Frequently Asked Questions | ||
| Noun | |||
| “FAQ” | |||
| foire aux questions | |||
| | |||
|- | |- | ||
| | | Fully Qualified Domain Name | ||
| Noun | |||
| See https://en.wikipedia.org/wiki/Fully_qualified_domain_name | |||
| | |||
| | |||
|- | |- | ||
| | | Functionality | ||
| Noun | |||
| | |||
| fonction | |||
| Rarement fonctionnalité, qui est le caractère de ce qui estfonctionnel, de ce qui répond à une fonction déterminée, ou encorepossibilité de traitement offerte par un système informatique, unlogiciel ou un site Web, par exemple des fonctionnalitésd’administration.Synonyme : option.Attention : Fonctionnalité n’est pas toujours interchangeable avec fonction ouoption. | |||
|- | |- | ||
| | | GB | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | GC | ||
| Noun | |||
| Garbage collector | |||
| nettoyeur de mémoire | |||
| | |||
|- | |- | ||
| | | GDPR | ||
| Noun | |||
| Synonym: GDPRhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en | |||
| RGPD | |||
| Synonyme : RGPDhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_fr | |||
|- | |- | ||
| | | GFW | ||
| Noun | |||
| | |||
| grand pare-feu chinois | |||
| | |||
|- | |- | ||
| | | GIF | ||
| Noun | |||
| Graphics Interchange Format [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | GNU General Public License | ||
| Noun | |||
| | |||
| licence publique générale GNU | |||
| | |||
|- | |- | ||
| GPG | | GPG | ||
| Noun | |||
| "Gnu Privacy Guard" GPG is a free software that implements OpenPGP specification | |||
| | |||
| | |||
|- | |- | ||
| Garbage data | | Garbage data | ||
| Noun | |||
| | |||
| données parasites | |||
| | |||
|- | |- | ||
| Garlic | | Garlic | ||
| Noun | |||
| https://en.wikipedia.org/wiki/Garlic_routing | |||
| ail | |||
| | |||
|- | |- | ||
| Garlic routing | | Garlic routing | ||
| Noun | |||
| https://en.wikipedia.org/wiki/Garlic_routing | |||
| routage en ail | |||
| | |||
|- | |- | ||
| | | General Data Protection Regulation | ||
| Noun | |||
| Synonym: GDPRhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en | |||
| règlement général sur la protection des données | |||
| Synonyme : RGPDhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_fr | |||
|- | |- | ||
| Get | | Get | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Get Access Mode | ||
| Noun | |||
| [Lantern] | |||
| mode obtenir l'accès | |||
| [Lantern] | |||
|- | |- | ||
| | | GetTor | ||
| Noun | |||
| [Orbot, Tor] "It is a service that automatically responds to messages (Email, XMPP, Twitter) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub." (Source: Tor Glossary) | |||
| GetTor | |||
| | |||
|- | |- | ||
| | | Getting Started | ||
| Noun | |||
| | |||
| premiers pas | |||
| | |||
|- | |- | ||
| | | Ghost | ||
| Noun | |||
| [Peerio] "Ghost" is used as a proper noun in Peerio for a feature that allows users to send messages and files to a non-Peerio user via email or URL. This URL can be accessed with a secret passphrase and decrypted in the browser."I sent you a (Peerio) Ghost" | |||
| Ghost | |||
| [Peerio] Traduire par « Ghost (fantôme).Dans Peerio, Ghost est le nom d’une fonction qui permet aux utilisateurs d’envoyer des messages et des fichiers par courriel ou URL à d’autres utilisateurs qui n’utilisent pas Peerio. On peut accéder à cette URL par une phrase de passe secrète et le message est déchiffré dans le navigateur. « Je vous ai envoyé un Ghost (fantôme) Peerio ». | |||
|- | |- | ||
| | | Giant Rabbit | ||
| | |||
| This is the web agency doing for example the donate page of the Tor Project | |||
| | |||
| | |||
|- | |- | ||
| | | Give Access Mode | ||
| Noun | |||
| [Lantern] | |||
| mode donner l'accès | |||
| [Lantern] | |||
|- | |- | ||
| | | GlobaLeaks | ||
| Noun | |||
| [Globaleaks] Name of application. Do not translate. | |||
| | |||
| | |||
|- | |- | ||
| | | Glossary | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Go Back | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Google | ||
| Verb | |||
| Company Name (Reference Google.com for appropriate transcription if applicable) | |||
| rechercher sur Google | |||
| | |||
|- | |- | ||
| | | Google CAPTCHA | ||
| Noun | |||
| CAPTCHA is always capitalized.Plural is CAPTCHAsIt means Completely Automated Public Turing Test To Tell Computers and Humans Apart. | |||
| captcha Google | |||
| L’acronyme signifie « Test de Turing public complètement automatisé » pour différencier les ordinateurs des utilisateurs humains (« Completely Automated Public Turing Test To Tell Computers and Humans Apart. »).L’acronyme est maintenant lexicalisé, considéré comme un nom commun et peut prendre la marque du pluriel au besoin. | |||
|- | |- | ||
| | | Google Chrome | ||
| Noun | |||
| | |||
| Chrome de Google | |||
| | |||
|- | |- | ||
| | | Google Drive | ||
| Noun | |||
| | |||
| disque Google Drive | |||
| | |||
|- | |- | ||
| | | Google Play Store | ||
| Noun | |||
| [Signal] | |||
| logithèque Google Play Store | |||
| | |||
|- | |- | ||
| | | Got Skills | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Graceful Shutdown | ||
| Noun | |||
| [I2P] | |||
| fermeture respectueuse | |||
| [I2P] | |||
|- | |- | ||
| | | Gracefully | ||
| Adverb | |||
| | |||
| respectueusement | |||
| | |||
|- | |- | ||
| | | Graph | ||
| Noun | |||
| | |||
| graphique | |||
| | |||
|- | |- | ||
| | | Graph | ||
| Verb | |||
| | |||
| graphiquer | |||
| | |||
|- | |- | ||
| | | Great Firewall of China | ||
| Noun | |||
| | |||
| grand pare-feu chinois | |||
| | |||
|- | |- | ||
| | | Grid | ||
| Noun | |||
| | |||
| Grille | |||
| | |||
|- | |- | ||
| | | Guardian Project | ||
| Noun | |||
| | |||
| Projet Guardian | |||
| Chaque mot commence par une majuscule | |||
|- | |- | ||
| | | HQ | ||
| Noun | |||
| | |||
| siège social | |||
| | |||
|- | |- | ||
| | | HRD | ||
| Noun | |||
| Human Rights Defence | |||
| DDP | |||
| Défense des droits de la personne | |||
|- | |- | ||
| | | HTTP | ||
| Noun | |||
| [KeepassXC, CGIProxy, Orbot, Tor] "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web." - Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol) | |||
| | |||
| | |||
|- | |- | ||
| Header | | HTTP Header Field Manipulation | ||
| Noun | |||
| | |||
| HTTP Manipulation du champ d'en-tête | |||
| | |||
|- | |- | ||
| | | HTTP Invalid Request Line | ||
| Noun | |||
| | |||
| HTTP Ligne de requête invalide | |||
| | |||
|- | |- | ||
| | | HTTPS | ||
| Noun | |||
| [Tor] "HTTPS (also called HTTP over Transport Layer Security [TLS], HTTP over SSL, and HTTP Secure) is a communications protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data." - Wikipedia (https://en.wikipedia.org/wiki/HTTPS) | |||
| HTTPS | |||
| Si vous avez déjà vu une adresse Web épelée « http://www.exemple.com/ », vous reconnaissez la partie « http » de cette adresse. Le HTTP (protocole de transfert hypertexte) est le moyen qu’un navigateur Web sur votre machine utilise pour parler à un serveur Web distant. Malheureusement, le HTTP normal envoie du texte par Internet sans sécurité. Le HTTPS (S signifiant sécurisé) utilise le chiffrement pour mieux mettre à l’abri des regards indiscrets les données que vous envoyez aux sites Web ainsi que les informations qu’ils vous retournent.Source FFÉ. | |||
|- | |- | ||
| | | HTTPS Everywhere | ||
| Noun | |||
| [Tor] "HTTPS Everywhere is a Firefox, Chrome, and Opera extension that makes HTTPS the default on websites that have set up HTTPS but have not made it the default. HTTPS Everywhere is installed in Tor Browser." (Source: Tor Glossary) | |||
| HTTPS partout | |||
| | |||
|- | |- | ||
| | | HTTPS certificate | ||
| Noun | |||
| [Tor] | |||
| certificat HTTPS | |||
| | |||
|- | |- | ||
| | | HVM | ||
| Noun | |||
| [Qubes] "Hardware Virtual Machine"Any fully virtualized, or hardware-assisted, VM utilizing the virtualization extensions of the host CPU. | |||
| MVM | |||
| Pour "Machine Virtuelle Matérielle" | |||
|- | |- | ||
| | | Hardcoded | ||
| Verb | |||
| | |||
| figé dans le code | |||
| | |||
|- | |- | ||
| | | Hardware | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Headline | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Heart of Internet Freedom | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Heartbeat | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Help | ||
| Noun | |||
| [Orbot, Outline] Menu option. | |||
| | |||
| | |||
|- | |- | ||
| | | Hypertext Transfer Protocol | ||
| Noun | |||
| | |||
| protocole de transfert hypertexte | |||
| | |||
|- | |- | ||
| | | I/O | ||
| Noun | |||
| Input/ouput | |||
| E/S | |||
| Entrée/sortie | |||
|- | |- | ||
| | | I2P | ||
| Noun | |||
| [I2P] Name of application. Do not translate. | |||
| | |||
| | |||
|- | |- | ||
| | | ID | ||
| Noun | |||
| [Mailvelope] | |||
| ID | |||
| identifiant pour les produits Apple | |||
|- | |- | ||
| | | IDE | ||
| Noun | |||
| | |||
| environnement de développement intégré | |||
| | |||
|- | |- | ||
| | | IMAP settings | ||
| Noun | |||
| IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.Source EFF. | |||
| paramètres IMAP | |||
| IMAP est le protocole utilisé par de nombreux programmes de courriel pour communiquer avec les services qui envoient, reçoivent et stockent vos courriels. En changeant les paramètres IMAP de votre programme de courriel, vous pouvez choisir de charger vos courriels à partir de serveurs différents et de définir le niveau de sécurité et de chiffrement utilisé pour transférer les courriels d’Internet vers vous.Source EFF. | |||
|- | |- | ||
| | | IP address | ||
| Noun | |||
| [Orbot, Outline, CGIProxy, Tor] A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. (Source EFF) | |||
| adresse IP | |||
| Sur Internet, un appareil doit avoir sa propre adresse pour recevoir des données, comme une résidence ou une société doivent avoir une adresse civique pour recevoir du courriel physique. Cette adresse est son adresse IP (protocole Internet). Quand vous vous connectez à un site Web ou autre serveur en ligne, vous révélez habituellement votre propre adresse IP. Cela ne révèle pas forcément votre identité (il est difficile d’associer une adresse IP à une vraie adresse ou à un ordinateur particulier). Une adresse IP peut cependant révéler des informations sur vous, telles que votre position géographique approximative ou le nom de votre fournisseur d’accès à Internet. Des services comme Tor vous permettent de dissimuler votre adresse IP, ce qui contribue à préserver votre anonymat en ligne.Source FFÉ. | |||
|- | |- | ||
| | | IP address spoofing | ||
| Noun | |||
| | |||
| usurpation d’adresse IP | |||
| | |||
|- | |- | ||
| | | IRS | ||
| Noun | |||
| US Internal Revenu Service | |||
| agence du revenu des États-Unis | |||
| | |||
|- | |- | ||
| | | ISAC | ||
| Noun | |||
| [Deflect]Information Sharing and Analysis Center | |||
| CPAI | |||
| [Deflect]Centre de partage et d’analyse de l’information | |||
|- | |- | ||
| | | ISP | ||
| Noun | |||
| [Tor] Internet Service Provider "An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting." (Source: Tor Glossary) | |||
| FAI | |||
| Fournisseur d’accès à Internet | |||
|- | |- | ||
| Immediate | | Immediate | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| Implement | | Implement | ||
| Verb | |||
| | |||
| mettre en œuvre | |||
| Réaliser l’ultime finale d’élaboration d’un système informatique pour le rendre fonctionnel.Synonyme : implémenter | |||
|- | |- | ||
| Inbound | | Inbound | ||
| Adjective | |||
| | |||
| entrant | |||
| | |||
|- | |- | ||
| Include Private Data | | Include Private Data | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Indicators of compromise | ||
| Noun | |||
| Clues that show that your device may have been broken into or tampered with.Source EFF. | |||
| indicateurs de compromission | |||
| Indices qui démontrent que votre appareil pourrait avoir été piraté ou modifié frauduleusement.Source FFÉ. | |||
|- | |- | ||
| | | Intermediate Certificate | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Internal storage | ||
| Noun | |||
| Non volatile memory used in devices, mobile or else. | |||
| mémoire interne | |||
| La mémoire à long terme (mémoire non volatile) permet de conserver les données, par exemple sur un appareil mobile.Ne pas confondre avec le stockage qui est l’action de conservation des données dans une mémoire. | |||
|- | |- | ||
| | | Internet censorship | ||
| Noun | |||
| | |||
| censure d’Internet | |||
| | |||
|- | |- | ||
| | | Internet filtering, content filtering | ||
| Noun | |||
| [Orbot] Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Network or services like Tor are sometimes used to access Internet communciations that would otherwise be filtered.(Source: EFF) | |||
| filtrage d’Internet | |||
| Filtrage est un terme poli pour regrouper les notions de blocage et de censure du trafic Internet. Les réseaux privés virtuels ou les services tels que Tor sont parfois utilisés pour accéder à des communications Internet qui seraient filtrées autrement.Filtrage est un terme plus poli pour regrouper les notions de blocage et de censure du trafic Internet.Synonyme : blocage.Source : FFÉ. | |||
|- | |- | ||
| | | Introduce | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Introducer | ||
| Noun | |||
| | |||
| proposeur | |||
| | |||
|- | |- | ||
| | | Introduction | ||
| Noun | |||
| | |||
| présentation | |||
| | |||
|- | |- | ||
| | | Item | ||
| Noun | |||
| | |||
| élément | |||
| Synonyme : article | |||
|- | |- | ||
| | | JRE | ||
| Noun | |||
| Synonym: Java Runtime Environment | |||
| moteur d’exécution Java | |||
| | |||
|- | |- | ||
| | | JS | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Java Runtime Environment | ||
| Noun | |||
| Synonyme : JRE | |||
| moteur d’exécution Java | |||
| | |||
|- | |- | ||
| | | JavaScript | ||
| Noun | |||
| [Tor] "JavaScript is a programming language that websites use to offer interactive elements such as video, animation, audio, and status timelines. Unfortunately, JavaScript can also enable attacks on the security of the web browser, which might lead to deanonymization. The NoScript extension in Tor Browser can be used to manage JavaScript on different websites." (Source: Tor Project) | |||
| | |||
| | |||
|- | |- | ||
| | | Join | ||
| Verb | |||
| | |||
| se joindre | |||
| | |||
|- | |- | ||
| | | KB | ||
| Noun | |||
| [Orbot] kilobyte | |||
| | |||
| | |||
|- | |- | ||
| | | KB/s | ||
| Noun | |||
| | |||
| kb/s | |||
| kilobit par seconde | |||
|- | |- | ||
| | | KB/s, Kbps | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | KBps | ||
| Noun | |||
| | |||
| kb/s | |||
| kilobit par seconde | |||
|- | |- | ||
| | | Kbps, KB/s | ||
| Noun | |||
| [Orbot] kilobytes per second | |||
| | |||
| | |||
|- | |- | ||
| | | Key-signing party | ||
| Noun | |||
| When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: cryptoparty.Source EFF. | |||
| Échange de signature de clés | |||
| Quand vous utilisez le chiffrement par clé publique, il est important de vous assurer que la clé que vous utilisez pour chiffrer un message appartient vraiment au destinataire (voir Vérification de clé). PGP facilite un peu ce processus en permettant de dire aux autres « Je croie que cette clé appartient à cette personne et si vous me faites confiance vous devriez le croire aussi ». Dire au monde entier que vous vous avez confiance en la clé de quelqu’un est appelé « Signer la clé de cette personne » : cela signifie que quiconque utilise cette clé peut voir que vous la cautionnez. Pour encourager les uns et les autres à vérifier et à signer leurs clés, les utilisateurs de PGP organisent des rencontres d’échange de signature de clés. Elles sont presque aussi palpitantes qu’elle semble l’être.Analogie : semblable à une rencontre de réseautage où vous présentez vos amis les uns aux autres.Synonymes : chiffrofête.Source FFÉ. | |||
|- | |- | ||
| | | Keyboard | ||
| Noun | |||
| [Signal] | |||
| clavier | |||
| | |||
|- | |- | ||
| | | LGBTQ+ | ||
| Noun | |||
| "LGBTQ+" stands for "Lesbian, Gay, Bisexual, Transgender, Queer or Questioning and more"https://ok2bme.ca/resources/kids-teens/what-does-lgbtq-mean/ | |||
| | |||
| | |||
|- | |- | ||
| | | Language pack | ||
| Noun | |||
| | |||
| paquet de langue | |||
| | |||
|- | |- | ||
| | | Lantern | ||
| Noun | |||
| [Lantern] Application Name (https://getlantern.org) | |||
| | |||
| | |||
|- | |- | ||
| | | Lantern Cloud Server | ||
| Noun | |||
| [Lantern] “Lantern” is the name of an application. (https://getlantern.org) | |||
| Serveur nuagique Lantern | |||
| [Lantern] | |||
|- | |- | ||
| | | Last Name | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Launcher | ||
| Noun | |||
| [Tor] | |||
| lanceur | |||
| | |||
|- | |- | ||
| | | Leak | ||
| Noun | |||
| Synonym: data leakage | |||
| fuite | |||
| Synonyme : fuite de données | |||
|- | |- | ||
| | | Lease | ||
| Noun | |||
| | |||
| bail | |||
| | |||
|- | |- | ||
| | | Leaseset | ||
| Noun | |||
| | |||
| jeu de baux | |||
| | |||
|- | |- | ||
| | | Let's Encrypt | ||
| Noun | |||
| Don't translate this. For more info see https://en.wikipedia.org/wiki/Let%27s_Encrypt | |||
| | |||
| | |||
|- | |- | ||
| | | License Agreement | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Linked Identity | ||
| Noun | |||
| | |||
| identité reliée | |||
| | |||
|- | |- | ||
| | | List | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Listen | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Live CD | ||
| Noun | |||
| | |||
| CD autonome | |||
| | |||
|- | |- | ||
| | | Live ISO | ||
| Noun | |||
| | |||
| ISO autonome | |||
| | |||
|- | |- | ||
| | | Live OS | ||
| Noun | |||
| | |||
| SE autonome | |||
| | |||
|- | |- | ||
| | | Live System | ||
| Noun | |||
| | |||
| système autonome | |||
| | |||
|- | |- | ||
| | | Live USB | ||
| Noun | |||
| | |||
| USB autonome | |||
| | |||
|- | |- | ||
| | | Localization Lab | ||
| Noun | |||
| | |||
| Labo de localisation | |||
| | |||
|- | |- | ||
| | | Login page | ||
| Noun | |||
| | |||
| page de connexion | |||
| | |||
|- | |- | ||
| | | MAC address spoofing | ||
| Noun | |||
| | |||
| [Tails] usurpation d’adresse MAC | |||
| | |||
|- | |- | ||
| | | MB | ||
| Noun | |||
| [Orbot] megabyte | |||
| | |||
| | |||
|- | |- | ||
| | | MBR | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | MIME | ||
| Noun | |||
| [Signal, CGIProxy] | |||
| | |||
| | |||
|- | |- | ||
| | | MISP (Malware Information Sharing Platform) | ||
| Noun | |||
| [SES] "The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information." -http://www.misp-project.org/ | |||
| | |||
| | |||
|- | |- | ||
| | | MITM (Man-in-the-middle attack) | ||
| Noun | |||
| Suppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: Man-in-the-middle attack.Source EFF. | |||
| attaque de l’intercepteur | |||
| Supposons que vous croyez que vous échangez avec votre ami Mark grâce à une messagerie instantanée chiffrée. Pour vous assurer que c’est bien lui, vous lui demandez de vous indiquer dans quelle ville vous vous êtes connus. Sa réponse est « Johannesburg ». C’est juste ! Malheureusement, sans que Mark ni vous ne le sachiez, quelqu’un d’autre, en ligne, a intercepté toutes vos communications. Lors de votre première connexion à Mark, vous vous êtes en fait connecté à cette personne qui s’est à son tour connectée à Mark. Quand vous pensez que vous posez une question à Mark, cette personne reçoit votre message, relaie la question à Mark, reçoit sa réponse et vous l’envoie ensuite. Alors que vous pensez communiquer en toute sécurité avec Mark, vous êtes en fait en train de communiquer en toute sécurité avec l’espion qui communique aussi en toute sécurité avec Mark ! C’est une attaque de l’intercepteur. L’intercepteur peut espionner vos communications et même insérer des messages faux ou trompeurs dans vos communications. Les logiciels de communication par Internet axés sur la sécurité doivent se défendre contre l’attaque de l’intercepteur pour être à l’abri d’attaquants qui contrôlent quelque portion d’Internet entre deux personnes qui communiquent.Synonyme : attaque de l’intercepteur, attaque par hôte interposé.Source FFÉ. | |||
|- | |- | ||
| | | MM | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | MMS | ||
| Noun | |||
| “Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | MMSC | ||
| Noun | |||
| Multimedia Messaging Service Center. A mobile network operator's store and forward server for relaying MMS (Multimedia Messaging Service) messages. [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | Magic Word | ||
| Noun | |||
| | |||
| mot magique | |||
| | |||
|- | |- | ||
| | | Mailvelope | ||
| | |||
| | |||
| Mailvelope | |||
| | |||
|- | |- | ||
| | | Maintainer | ||
| Noun | |||
| | |||
| mainteneur | |||
| | |||
|- | |- | ||
| | | Malformed | ||
| Adjective | |||
| | |||
| mal formé | |||
| | |||
|- | |- | ||
| | | Malicious | ||
| Adjective | |||
| | |||
| malveillant | |||
| | |||
|- | |- | ||
| | | Malicious software | ||
| Noun | |||
| Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malware.Source EFF. | |||
| programme malveillant | |||
| Un programme conçu pour effectuer des actions non désirées sur votre appareil. Les virus informatiques sont des programmes malveillants. Il en est de même pour les programmes qui volent vos mots de passe, vous enregistrent en secret ou suppriment vos données.Synonymes : logiciel malveillant, maliciel.Source FFÉ. | |||
|- | |- | ||
| | | Malware | ||
| Noun | |||
| Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malicious softwareSource EFF. | |||
| programme malveillant | |||
| Un programme conçu pour effectuer des actions non désirées sur votre appareil. Les virus informatiques sont des programmes malveillants. Il en est de même pour les programmes qui volent vos mots de passe, vous enregistrent en secret ou suppriment vos données.Synonymes : logiciel malveillant, malicielSource FFÉ. | |||
|- | |- | ||
| | | Man-in-the-middle attack (MITM) | ||
| Noun | |||
| Suppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: MITMSource EFF. | |||
| attaque de l’intercepteur | |||
| Supposons que vous croyez que vous échangez avec votre ami Mark grâce à une messagerie instantanée chiffrée. Pour vous assurer que c’est bien lui, vous lui demandez de vous indiquer dans quelle ville vous vous êtes connus. Sa réponse est « Johannesburg ». C’est juste ! Malheureusement, sans que Mark ni vous ne le sachiez, quelqu’un d’autre, en ligne, a intercepté toutes vos communications. Lors de votre première connexion à Mark, vous vous êtes en fait connecté à cette personne qui s’est à son tour connectée à Mark. Quand vous pensez que vous posez une question à Mark, cette personne reçoit votre message, relaie la question à Mark, reçoit sa réponse et vous l’envoie ensuite. Alors que vous pensez communiquer en toute sécurité avec Mark, vous êtes en fait en train de communiquer en toute sécurité avec l’espion qui communique aussi en toute sécurité avec Mark ! C’est une attaque de l’intercepteur. L’intercepteur peut espionner vos communications et même insérer des messages faux ou trompeurs dans vos communications. Les logiciels de communication par Internet axés sur la sécurité doivent se défendre contre l’attaque de l’intercepteur pour être à l’abri d’attaquants qui contrôlent quelque portion d’Internet entre deux personnes qui communiquent.Synonyme : attaque par hôte interposé.Source FFÉ. | |||
|- | |- | ||
| | | Manage Contacts | ||
| Noun | |||
| [Martus] Martus menu option. | |||
| | |||
| | |||
|- | |- | ||
| | | Martus Desktop | ||
| Noun | |||
| [Martus] | |||
| Martus pour ordinateur | |||
| [Martus] | |||
|- | |- | ||
| | | Martus Desktop Application | ||
| Noun | |||
| [Martus] | |||
| application Martus pour ordinateur | |||
| [Martus] | |||
|- | |- | ||
| | | Martus Information Management and Data Collection Framework | ||
| Noun | |||
| [Martus] | |||
| cadre applicatif Martus de gestion des informations et de collecte des données | |||
| [Martus] | |||
|- | |- | ||
| | | Martus Record Archive (*mba) | ||
| Noun | |||
| [Martus] | |||
| archive de bulletins Martus (*mba) | |||
| [Martus] | |||
|- | |- | ||
| | | Martus Report Format (.mrf) | ||
| Noun | |||
| [Martus] | |||
| format de rapport Martus | |||
| [Martus] | |||
|- | |- | ||
| | | Martus Search Specification | ||
| Noun | |||
| [Martus] | |||
| spécification de recherche Martus | |||
| [Martus] | |||
|- | |- | ||
| | | Master Boot Record, MBR | ||
| Noun | |||
| | |||
| enregistrement d'amorçage maître | |||
| | |||
|- | |- | ||
| | | Match | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Matching | ||
| Adjective | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Matching Conditions | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Megabytes | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Message Format | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Message Of The Day | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Mixnet | ||
| Noun | |||
| | |||
| réseau de mélange | |||
| | |||
|- | |- | ||
| | | Mobile Martus | ||
| Noun | |||
| [Martus] | |||
| Martus mobile | |||
| [Martus] | |||
|- | |- | ||
| | | Multihome | ||
| Noun | |||
| | |||
| multiconnexions | |||
| | |||
|- | |- | ||
| | | Multihoming | ||
| Noun | |||
| | |||
| multiconnexions | |||
| | |||
|- | |- | ||
| | | My Computer | ||
| Noun | |||
| The user’s home folder in some operating systems. | |||
| Poste de travail | |||
| Dossier personnel de l’utilisateur sous certains systèmes d’exploitation | |||
|- | |- | ||
| | | NAT | ||
| Noun | |||
| Network Address Translation | |||
| traduction d’adresses de réseau | |||
| | |||
|- | |- | ||
| | | NGO | ||
| Noun | |||
| Non-Governmental Organization | |||
| | |||
| | |||
|- | |- | ||
| | | NGOs | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | NSA | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Name | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Naming service | ||
| Noun | |||
| | |||
| service de noms | |||
| | |||
|- | |- | ||
| | | Navigate to | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | NetDB | ||
| Noun | |||
| network database | |||
| BDréseau | |||
| base de données de réseau | |||
|- | |- | ||
| | | NetVM | ||
| Noun | |||
| "Network Virtual Machine"A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM. | |||
| MVréseau | |||
| | |||
|- | |- | ||
| | | Next | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Next | ||
| Noun | |||
| “Next” button | |||
| | |||
| | |||
|- | |- | ||
| | | No | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Non-Tor | ||
| Noun | |||
| | |||
| non Tor | |||
| | |||
|- | |- | ||
| | | OK | ||
| Noun | |||
| [Signal] “OK” button which can also be translated as “Accept” | |||
| Valider | |||
| | |||
|- | |- | ||
| | | OONI | ||
| Noun | |||
| [Tor, OONI Probe] "OONI stands for "Open Observatory of Network Interference", it is a global observation network for detecting censorship, surveillance and traffic manipulation on the internet." (Source: Tor Project) | |||
| | |||
| | |||
|- | |- | ||
| | | OPML | ||
| Noun | |||
| Outline Processor Markup Language"OPML (Outline Processor Markup Language) is an XML format for outlines (defined as "a tree, where each node contains a set of named attributes with string values"). Originally developed by UserLand as a native file format for the outliner application in its Radio UserLand product, it has since been adopted for other uses, the most common being to exchange lists of web feeds between web feed aggregators."- https://en.wikipedia.org/wiki/Opml | |||
| | |||
| | |||
|- | |- | ||
| | | OS | ||
| Noun | |||
| Operating system | |||
| SE | |||
| système d'exploitation | |||
|- | |- | ||
| | | OTR | ||
| Noun | |||
| Off The Record | |||
| protocole OTR | |||
| Souvent, les systèmes de messagerie instantanée ne sont pas chiffrés. Le protocole OTR est une façon d’y ajouter le chiffrement afin que vous continuiez à utiliser des réseaux familiers tels que les systèmes de clavardage de Facebook et Google ou encore Hangouts, tout en vous assurant que vos messages résistent mieux à la surveillance.Le protocole cryptographique OTR apporte un chiffrement robuste aux systèmes de messagerie instantanée,Synonyme : messagerie OTRSource FFÉ. | |||
|- | |- | ||
| | | Observatory | ||
| Noun | |||
| | |||
| observatoire | |||
| | |||
|- | |- | ||
| | | Off | ||
| Adjective | |||
| | |||
| désactivé | |||
| Synonyme : éteint | |||
|- | |- | ||
| | | Off-the-Record | ||
| Noun | |||
| [Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for messaging conversations. (Synonyms : OTR) (Source EFF) | |||
| protocole OTR | |||
| Souvent, les systèmes de messagerie instantanée ne sont pas chiffrés. Le protocole OTR est une façon d’y ajouter le chiffrement afin que vous continuiez à utiliser des réseaux familiers tels que les systèmes de clavardage de Facebook et Google ou encore Hangouts, tout en vous assurant que vos messages résistent mieux à la surveillance.Le protocole cryptographique OTR apporte un chiffrement robuste aux systèmes de messagerie instantanée,Synonyme : messagerie OTR.Source FFÉ. | |||
|- | |- | ||
| | | On | ||
| Preposition | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Onion | ||
| Noun | |||
| [Tor] | |||
| onion | |||
| [Tor] | |||
|- | |- | ||
| | | Onion Browser | ||
| Noun | |||
| [Tor] Project Name. Do not translate "Onion", however you can translate "Browser". Ex: Navegador Onion | |||
| Navigateur Onion | |||
| [Tor] Chaque mot commence par une majuscule. | |||
|- | |- | ||
| | | Onion Circuits | ||
| Noun | |||
| [Tor] | |||
| circuits onion | |||
| [Tor] | |||
|- | |- | ||
| | | Onion Services | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Online Abuse | ||
| | |||
| | |||
| Harcèlement en ligne | |||
| | |||
|- | |- | ||
| | | Open Observatory of Network Interference | ||
| Noun | |||
| [OONI Probe, Tor] Acronym: OONI | |||
| observatoire ouvert des interférences réseau | |||
| | |||
|- | |- | ||
| | | Open Whisper Systems | ||
| Noun | |||
| Organization name. Do not translate. [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | OpenPGP | ||
| Noun | |||
| [Mailvelope]OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy) | |||
| | |||
| | |||
|- | |- | ||
| | | OpenPGP key | ||
| Noun | |||
| [Mailvelope] | |||
| clé OpenPGP | |||
| | |||
|- | |- | ||
| | | Operating System (OS) | ||
| Noun | |||
| [Signal, Tor] A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems. (Source: EFF)(Synonym: OS) | |||
| système d’exploitation | |||
| Un logiciel de base qui exécute tous les autres programmes sur un ordinateur. Windows, Linux, Android, macOS et iOS sont des exemples de systèmes d’exploitation.Source FFÉ.Synonyme : SE. | |||
|- | |- | ||
| | | Orbot | ||
| Noun | |||
| [Orbot] Name of application. Do not translate. | |||
| | |||
| | |||
|- | |- | ||
| | | Oudated | ||
| Adjective | |||
| | |||
| désuet | |||
| | |||
|- | |- | ||
| | | Out-of-band verification | ||
| Noun | |||
| "Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.Synonyms: out-of-bandSource EFF. | |||
| vérification hors bande | |||
| « Hors bande » signifie n’importe quelle méthode de communication qui n’est pas la méthode actuelle. Vérifier l’identité de la personne avec qui vous communiquez par un système non sécurisé exige souvent de communiquer hors bande par une autre méthode qui est moins vulnérable à la même sorte d’attaque. Vous pourriez donc par exemple vérifier que vous utilisez la bonne clé publique de quelqu’un en lui parlant en personne avant de l’utiliser pour chiffrer votre courriel.Synonyme : hors bandeSource FFÉ. | |||
|- | |- | ||
| | | Outdated | ||
| Adjective | |||
| | |||
| désuet | |||
| | |||
|- | |- | ||
| | | Outline | ||
| Noun | |||
| [Outline] Name of an application. Please **do not translate** the application name. If needed, you can transcribe the name and place it in parentheses after the original name. Ex: Psiphon (ሳይፈን) | |||
| | |||
| | |||
|- | |- | ||
| | | Outline Manager | ||
| Noun | |||
| [Outline] Name of a project. Please do not translate or transcribe the name. | |||
| | |||
| | |||
|- | |- | ||
| | | Overhead | ||
| Noun | |||
| | |||
| surcharge | |||
| | |||
|- | |- | ||
| | | Overview | ||
| Noun | |||
| [Globaleaks] | |||
| aperçu | |||
| Vue d’ensemble | |||
|- | |- | ||
| | | P.O. Box | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | P2P | ||
| Adjective | |||
| | |||
| pair à pair | |||
| Sans traits d’union en apposition. | |||
|- | |- | ||
| | | PDF | ||
| Noun | |||
| | |||
| PDF | |||
| | |||
|- | |- | ||
| | | PGP | ||
| Noun | |||
| [Mailvelope]"Pretty Good Privacy" PGP is a commercial software for cyphering | |||
| PGP | |||
| PGP (littéralement « confidentialité plutôt bonne » en anglais) était l’une des premières mises en œuvre populaires de la cryptographie par clé publique. Phil Zimmermann, son créateur, a écrit le programme en 1991 pour aider les activistes et autres à protéger leurs communications. Il a fait l’objet d’une enquête officielle du gouvernement américain quand le programme s’est propagé en dehors des États-Unis. Alors, l’exportation d’outils qui incluaient un chiffrement robuste par clé publique violait la loi américaine. PGP existe encore comme logiciel commercial. GnuPG (ou GPG), une mise en œuvre libre de la même norme utilisée par PGP est aussi offerte. Dans la mesure où les deux utilisent la même approche interchangeable, on parlera souvent d’utiliser une « clé PGP » ou d’envoyer un « message PGP » même si GnuPG est utilisé.Synonymes : logiciel de chiffrement PGP, logiciel PGPSource EFF. | |||
|- | |- | ||
| | | PIN | ||
| Noun | |||
| Personal Identification Number [Signal] | |||
| NIP | |||
| Numéro d’identification personnel | |||
|- | |- | ||
| | | PV | ||
| Noun | |||
| [QubesOS] "Paravirtualization"An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms. | |||
| PV | |||
| paravirtualisation | |||
|- | |- | ||
| | | PVHVM | ||
| Noun | |||
| [QubesOS] "Paravirtualization on Hardware Virtual Machine"To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers). | |||
| MVPVM | |||
| Machine virtuelle à paravirtualisation matérielle | |||
|- | |- | ||
| | | Padding | ||
| Noun | |||
| | |||
| remplissage | |||
| | |||
|- | |- | ||
| | | Pane | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Panic | ||
| Noun | |||
| Panic button, panic app | |||
| Urgence | |||
| Bouton d’urgence, appli d’urgence | |||
|- | |- | ||
| | | Passwords field | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Peer-to-Peer | ||
| Adjective | |||
| | |||
| pair à pair | |||
| Sans traits d’union en apposition. | |||
|- | |- | ||
| | | Perfect forward secrecy | ||
| Noun | |||
| A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.Synonyms: Forward secrecy.Source EFF. | |||
| Confidentialité persistante parfaite | |||
| Une propriété d’un système sécurisé de messagerie qui garantit la sécurité de vos communications passées même si l’une des clés privées est volée ultérieurement. Pour les sites HTTPS, la confidentialité persistante est une protection importante contre des adversaires tels que les agences de renseignement qui pourraient enregistrer une grande quantité du trafic et utiliser une clé volée pour le déchiffrer.Synonyme : confidentialité persistante.Source EFF. | |||
|- | |- | ||
| | | Perl | ||
| Noun | |||
| [CGIProxy] Name of a programming language or referring to a family of programming languages. Do not translate or transcribe. | |||
| | |||
| | |||
|- | |- | ||
| | | Persistence wizard | ||
| Noun | |||
| | |||
| Assistant de persistance | |||
| | |||
|- | |- | ||
| | | Phrases | ||
| Noun | |||
| | |||
| phrases | |||
| | |||
|- | |- | ||
| | | Pie Chart | ||
| Noun | |||
| [Martus] | |||
| graphique circulaire | |||
| | |||
|- | |- | ||
| | | Piece | ||
| Noun | |||
| | |||
| morceau | |||
| | |||
|- | |- | ||
| | | Plaintext | ||
| Noun | |||
| [Globaleaks] [Signal] | |||
| Texte brut / texte en clair | |||
| | |||
|- | |- | ||
| | | Plan | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Plans | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Pledge | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Policy | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Pool | ||
| Noun | |||
| | |||
| réserve | |||
| | |||
|- | |- | ||
| | | Port forwarding | ||
| Noun | |||
| [Outline] Wikipedia: https://en.wikipedia.org/wiki/Port_forwarding | |||
| | |||
| | |||
|- | |- | ||
| | | Post | ||
| Noun | |||
| | |||
| billet, article | |||
| billet de blogue, article de forum | |||
|- | |- | ||
| | | Post | ||
| Verb | |||
| | |||
| publier | |||
| | |||
|- | |- | ||
| | | Post-traumatic stress | ||
| Noun | |||
| | |||
| Stress post-traumatique | |||
| | |||
|- | |- | ||
| | | Posted | ||
| Verb | |||
| | |||
| publié | |||
| | |||
|- | |- | ||
| | | Power Off | ||
| Verb | |||
| | |||
| Éteindre | |||
| | |||
|- | |- | ||
| | | Powering Digital Resisteance | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Premium | ||
| Noun | |||
| [Psiphon] | |||
| Pro | |||
| [Psiphon] | |||
|- | |- | ||
| | | Preparation | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Pretty Good Privacy | ||
| Noun | |||
| PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. (Synonyms: PGP) (Source: EFF) | |||
| PGP | |||
| PGP (littéralement « confidentialité plutôt bonne » en anglais) était l’une des premières mises en œuvre populaires de la cryptographie par clé publique. Phil Zimmermann, son créateur, a écrit le programme en 1991 pour aider les activistes et autres à protéger leurs communications. Il a fait l’objet d’une enquête officielle du gouvernement américain quand le programme s’est propagé en dehors des États-Unis. Alors, l’exportation d’outils qui incluaient un chiffrement robuste par clé publique violait la loi américaine. PGP existe encore comme logiciel commercial. GnuPG (ou GPG), une mise en œuvre libre de la même norme utilisée par PGP est aussi offerte. Dans la mesure où les deux utilisent la même approche interchangeable, on parlera souvent d’utiliser une « clé PGP » ou d’envoyer un « message PGP » même si GnuPG est utilisé.Synonymes : logiciel de chiffrement PGP, logiciel PGP.Source EFF. | |||
|- | |- | ||
| | | Primary | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Private Messenger | ||
| | |||
| | |||
| Private Messenger | |||
| | |||
|- | |- | ||
| | | Proceed | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Promote | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Promotion Text | ||
| | |||
| | |||
| Texte Promotionnel | |||
| | |||
|- | |- | ||
| | | Protect | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ProxyVM | ||
| Noun | |||
| [QubesOS] "Proxy Virtual Machine"A type of VM which proxies network access for other VMs | |||
| MVmandataire | |||
| | |||
|- | |- | ||
| | | PsiCash | ||
| Noun | |||
| [Psiphon] Do not translate or transliterate/transcribe "PsiCash". | |||
| PsiCash | |||
| [Psiphon] Ne doit pas être traduit. | |||
|- | |- | ||
| | | Psiphon | ||
| Noun | |||
| Name of an organization and application. Please **do not translate or transliterate/transcribe** this name. | |||
| Psiphon | |||
| | |||
|- | |- | ||
| | | Public Information File (*.mpi) | ||
| Noun | |||
| [Martus] Files containing the account's public information | |||
| Fichiers d’informations publiques (*.mpi) | |||
| | |||
|- | |- | ||
| | | Q&A | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | QR code | ||
| Noun | |||
| [Signal, Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | Qubes Global Settings | ||
| Noun | |||
| [QubesOS] | |||
| paramètres généraux de Qubes | |||
| | |||
|- | |- | ||
| | | Qubes OS | ||
| Noun | |||
| [QubesOS] Do not translate "Qubes OS" | |||
| Qubes OS | |||
| | |||
|- | |- | ||
| | | Query | ||
| Noun | |||
| | |||
| demande | |||
| | |||
|- | |- | ||
| | | Questionnaire | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | RAM | ||
| Noun | |||
| | |||
| mémoire vive | |||
| | |||
|- | |- | ||
| | | RMI | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ROM | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | Randomization | ||
| Noun | |||
| | |||
| aléation | |||
| | |||
|- | |- | ||
| | | Rate | ||
| Noun | |||
| | |||
| débit ou taux | |||
| selon les cas | |||
|- | |- | ||
| | | Read | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ReadMe | ||
| Noun | |||
| The ReadMe file included with any new software release that describes changes to software | |||
| LisezMoi | |||
| | |||
|- | |- | ||
| | | Reboot | ||
| Noun | |||
| | |||
| redémarrage | |||
| | |||
|- | |- | ||
| | | Reboot | ||
| Verb | |||
| | |||
| redémarrer | |||
| | |||
|- | |- | ||
| | | Record ID | ||
| Noun | |||
| | |||
| ID du bulletin | |||
| | |||
|- | |- | ||
| | | Reference Guide | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Referer | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Referer spoofing | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Refresh | ||
| Noun | |||
| | |||
| actualisation | |||
| | |||
|- | |- | ||
| | | Refresh | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Registration Lock | ||
| Noun | |||
| [Signal] | |||
| blocage de l’inscription | |||
| [Signal] | |||
|- | |- | ||
| | | Reject | ||
| Verb | |||
| | |||
| refuser | |||
| | |||
|- | |- | ||
| | | Release key | ||
| Noun | |||
| | |||
| clé de parution | |||
| | |||
|- | |- | ||
| | | Removable media | ||
| Noun | |||
| | |||
| support amovible | |||
| | |||
|- | |- | ||
| | | Removable media drive | ||
| Noun | |||
| | |||
| unité amovible | |||
| | |||
|- | |- | ||
| | | Repliable datagram | ||
| Noun | |||
| | |||
| Datagramme répondable | |||
| | |||
|- | |- | ||
| | | Required | ||
| Adjective | |||
| | |||
| exigé | |||
| | |||
|- | |- | ||
| | | Reseed | ||
| Verb | |||
| | |||
| réensemencer | |||
| | |||
|- | |- | ||
| | | Retry | ||
| Verb | |||
| | |||
| ressayer | |||
| | |||
|- | |- | ||
| | | Retweet | ||
| Noun | |||
| | |||
| Retwittage | |||
| | |||
|- | |- | ||
| | | Retweet | ||
| Verb | |||
| | |||
| Retwitter | |||
| | |||
|- | |- | ||
| | | Reusable Choice | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Revocation certificate | ||
| Noun | |||
| [Mailvelope] What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.Source EFF. | |||
| Certificat de révocation | |||
| Que se passe-t-il si vous perdez l’accès à une clé secrète ou si elle n’est plus secrète ? Un certificat de révocation est un fichier que vous pouvez générer pour annoncer que vous n’avez plus confiance dans cette clé. Vous le générez quand vous avez encore la clé secrète et le conservez en cas de désastre futur.Source EFF. | |||
|- | |- | ||
| | | Reward | ||
| Noun | |||
| | |||
| prime | |||
| Synonyme : récompense | |||
|- | |- | ||
| | | Rich Text | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Risk analysis | ||
| | |||
| | |||
| Analyse de risque | |||
| | |||
|- | |- | ||
| | | Risk analysis | ||
| Noun | |||
| In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.Synonyms: Risk, Risk Assessment.Source EFF. | |||
| Analyse des risques | |||
| En sécurité informatique, l’analyse des risques consiste à calculer les chances de succès des menaces afin que vous puissiez évaluer l’effort à produire pour vous défendre contre elles. Il pourrait exister de nombreuses façons différentes de perdre le contrôle ou l’accès de vos données, mais certaines sont moins susceptibles de se présenter que d’autres. Évaluer le risque signifie décider quelles menaces vous allez prendre au sérieux et lesquelles pourraient être trop rares ou trop inoffensives (ou encore trop difficiles à combattre) pour s’en soucier.Voir Modélisation des menaces.Synonymes : risque, appréciation des risquesSource EFF. | |||
|- | |- | ||
| | | Risk assessment | ||
| Noun | |||
| In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.Synonyms: Risk, Risk analysis.Source EFF. | |||
| Appréciation des risques | |||
| En sécurité informatique, l’analyse des risques consiste à calculer les chances de succès des menaces afin que vous puissiez évaluer l’effort à produire pour vous défendre contre elles. Il pourrait exister de nombreuses façons différentes de perdre le contrôle ou l’accès de vos données, mais certaines sont moins susceptibles de se présenter que d’autres. Évaluer le risque signifie décider quelles menaces vous allez prendre au sérieux et lesquelles pourraient être trop rares ou trop inoffensives (ou encore trop difficiles à combattre) pour s’en soucier. Voir Modélisation des risques.Synonymes : risque, analyse du risque.Source EFF. | |||
|- | |- | ||
| | | Roadmap | ||
| Noun | |||
| | |||
| calendrier de lancement | |||
| | |||
|- | |- | ||
| | | Role-based access control | ||
| Noun | |||
| [Globaleaks] | |||
| Contrôle d'accès basé sur les rôles | |||
| | |||
|- | |- | ||
| | | Root | ||
| Noun | |||
| | |||
| racine | |||
| | |||
|- | |- | ||
| | | RouterInfo | ||
| Noun | |||
| | |||
| InfosRouteur | |||
| | |||
|- | |- | ||
| | | Ruleset Tests | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Running environment | ||
| Noun | |||
| | |||
| environnement d'exécution | |||
| | |||
|- | |- | ||
| | | Runtime | ||
| Noun | |||
| | |||
| moteur d'exécution | |||
| | |||
|- | |- | ||
| | | SAFETAG | ||
| Noun | |||
| Do not translate. Accronym for "Security Auditing Framework and Evaluation Template for Advocacy Groups" | |||
| | |||
| | |||
|- | |- | ||
| | | SD card | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | SES (Suspicious Email Submitter) | ||
| Noun | |||
| [SES] Project Name. Please do not translate. | |||
| SES (Suspicious Email Submitter) | |||
| [SES] Nom du projet à ne pas traduire.Dans une phrase « diffuseur de courriels suspects, » | |||
|- | |- | ||
| | | SIM card | ||
| Noun | |||
| A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.Source EFF. | |||
| Carte SIM | |||
| Une petite carte amovible qui peut être insérée dans un appareil mobile afin de fournir un service auprès d’une entreprise de télécommunication mobile particulière. Les cartes SIM (carte d’identité de l’abonné) peuvent aussi enregistrer des numéros de téléphone et des messages texte.Source EFF. | |||
|- | |- | ||
| | | SMS | ||
| Noun | |||
| “SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.[1] It uses standardized communication protocols to enable mobile devices to exchange short text messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal] | |||
| texto | |||
| Synonyme : message texte | |||
|- | |- | ||
| | | SMTP | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | SOCKS | ||
| Noun | |||
| [Orbot] "Socket Secure (SOCKS) is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded." - Wikipedia (https://en.wikipedia.org/wiki/SOCKS) | |||
| | |||
| | |||
|- | |- | ||
| | | SSD (Solid-State Drive) | ||
| Noun | |||
| "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives."Source EFF | |||
| Disque électronique | |||
| Traditionnellement, les ordinateurs enregistraient les données sur des disques magnétiques rotatifs. Les appareils mobiles et un nombre croissant d’ordinateurs enregistrent maintenant les données permanentes sur des disques sans aucune pièce mécanique mobile. Ces disques électroniques sont actuellement plus coûteux, mais bien plus rapides que les mémoires magnétiques. Il peut malheureusement être plus difficile de supprimer de façon fiable et permanente des données d’un disque électronique.Synonyme : disque à semi-conducteurs, disque SSD.Source FFÉ. | |||
|- | |- | ||
| | | SSH | ||
| Noun | |||
| [KeepassXC] "Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users." - Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell) | |||
| Protocole SSH | |||
| Le protocole SSH est une méthode qui vous permet de contrôler un ordinateur à distance en toute sécurité par une interface en ligne de commande. Une des caractéristiques du protocole SSH est qu’en plus d’envoyer des commandes, vous pouvez aussi l’utiliser pour relayer en toute sécurité le trafic Internet entre deux ordinateurs. Pour mettre en place un lien SSH, le système distant doit exécuter un serveur SSH et la machine locale à besoin d’un programme client SSH.Source EFF. | |||
|- | |- | ||
| | | SSL | ||
| Noun | |||
| [TunnelBear, CGIProxy] "Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers." - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security) | |||
| | |||
| | |||
|- | |- | ||
| | | SSL Observatory | ||
| Noun | |||
| "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives."Source EFF | |||
| SSL Observatory | |||
| Ne devrait pas être dans le glossaire. | |||
|- | |- | ||
| | | SVM | ||
| Noun | |||
| Support Vector Machine | |||
| MVS | |||
| machine à vecteurs de support | |||
|- | |- | ||
| | | SVM (Support Vector Machine) | ||
| Noun | |||
| "In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis." - https://en.wikipedia.org/wiki/Support_vector_machine | |||
| | |||
| | |||
|- | |- | ||
| | | Satellite Provider | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Satori | ||
| Noun | |||
| [Tor] **Do not translate** "It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources. You can Install Satori from the Chrome Web Store." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | ScrambleSuit | ||
| Noun | |||
| [Tor] **Do not translate** "Scramblesuit is similar to obfs4 but has a different set of bridges." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | Screen Lock | ||
| Noun | |||
| [Signal] | |||
| Verrouillage de l’écran | |||
| | |||
|- | |- | ||
| | | Search | ||
| Noun | |||
| A search in a search engine. | |||
| Recherche | |||
| | |||
|- | |- | ||
| | | Search Engine | ||
| Noun | |||
| | |||
| Moteur de recherche | |||
| | |||
|- | |- | ||
| | | Search Results | ||
| Noun | |||
| Application menu item. | |||
| résultats de recherche | |||
| | |||
|- | |- | ||
| | | Secure Sockets Layer | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Secure Sockets Layer (SSL) | ||
| Noun | |||
| [TunnelBear, CGIProxy] The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL). (Synonyms: Transport layer security) (Source: EFF) | |||
| Protocole SSL | |||
| La technologie qui vous permet de maintenir une connexion sécurisée et chiffrée entre votre ordinateur et certains des sites Web et services Internet que vous visitez. Quand vous êtes connecté à un site Web grâce à cette technologie, l’adresse du site Web commence par https plutôt que par http. Son nom a officiellement été changé pour Sécurité de la couche de transport (TLS) en 1999, mais de nombreuses personnes continuent à utiliser l’ancien nom, le protocole SSL.Synonyme : sécurité de la couche de transport.Source EFF. | |||
|- | |- | ||
| | | Secure password database | ||
| Noun | |||
| A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them. (Synonyms: Password manager, password safe) (Source EFF) | |||
| Base de données sécurisée de mots de passe | |||
| Un outil qui peut chiffrer et enregistrer vos mots de passe grâce à un seul mot de passe maître, facilitant l’utilisation de plusieurs mots de passe différents sur des sites et des services différents sans avoir à les mémoriser.Synonymes : gestionnaire de mots de passe, coffre-fort à mots de passe.Source EFF. | |||
|- | |- | ||
| | | Security Auditing Framework and Evaluation Template for Advocacy Groups | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Security certificate | ||
| Noun | |||
| A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.(Synonyms: Digital certificate) (Source EFF) | |||
| Certificat de sécurité | |||
| Une façon de confirmer automatiquement qu’une clé publique est correcte (qu’elle est vraiment celle utilisée par une entité précise) afin de prévenir les attaques de l’intercepteur. Il est le plus souvent utilisé par les sites Web pour prouver à votre navigateur que vous avez une connexion sécurisée vers un vrai site et non quelque système qui manipulerait frauduleusement votre connexion,Synonyme : certificat numérique.Source EFF. | |||
|- | |- | ||
| | | Seed | ||
| Noun | |||
| | |||
| graine | |||
| | |||
|- | |- | ||
| | | Seeding | ||
| Noun | |||
| | |||
| ensemencement ou propagation | |||
| | |||
|- | |- | ||
| | | Sensitive | ||
| Adjective | |||
| | |||
| sensible/délicat | |||
| Synonymes : critique, délicat, vitalDonnée délicate | |||
|- | |- | ||
| | | Sensor | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | ServiceVM | ||
| Noun | |||
| "Service Virtual Machine"A VM the primary purpose of which is to provide a service or services to other VMs. | |||
| MVservice | |||
| | |||
|- | |- | ||
| | | Setting | ||
| Noun | |||
| | |||
| paramètre | |||
| | |||
|- | |- | ||
| | | Settings | ||
| Noun | |||
| [Signal] [Orbot] Application menu item. | |||
| paramètres | |||
| | |||
|- | |- | ||
| | | Short User Manual | ||
| Noun | |||
| | |||
| petit guide d’utilisation | |||
| | |||
|- | |- | ||
| | | Signal | ||
| Noun | |||
| [Signal] Name of application. Do not translate. | |||
| Signal | |||
| | |||
|- | |- | ||
| | | Size | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Slim | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Snowflake | ||
| Adjective | |||
| [Tor] Snowflake is a type of pluggable transport.This is a name, so is not translated. Although you can always add a transliteration to the first occurrence, between parenthesis. | |||
| | |||
| | |||
|- | |- | ||
| | | Software | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Solid State Drive | ||
| Noun | |||
| Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.Synonyms: SSD.Source EFF. | |||
| Disque électronique | |||
| Traditionnellement, les ordinateurs enregistraient les données sur des disques magnétiques rotatifs. Les appareils mobiles et un nombre croissant d’ordinateurs enregistrent maintenant les données permanentes sur des disques sans aucune pièce mécanique mobile. Ces disques électroniques sont actuellement plus coûteux, mais bien plus rapides que les mémoires magnétiques. Il peut malheureusement être plus difficile de supprimer de façon fiable et permanente des données d’un disque électronique.Synonyme : disque à semi-conducteurs, disque SSD.Source EFF. | |||
|- | |- | ||
| | | Speed Boost | ||
| Noun | |||
| [Psiphon] | |||
| Survitesse | |||
| [Psiphon] Avec une majuscule, car il s’agit du nom d’un produit Psiphon. | |||
|- | |- | ||
| | | Spyware | ||
| | |||
| | |||
| logiciel espion | |||
| Synonyme : espiogiciel | |||
|- | |- | ||
| | | Standalone(VM) | ||
| Noun | |||
| [QubesOS] "Standalone (Virtual Machine)"In general terms, a VM is described as **standalone** if and only if it does not depend on any other VM for its root filesystem. | |||
| MVautonome | |||
| Machine virtuelle autonome | |||
|- | |- | ||
| | | StandaloneHVM | ||
| Noun | |||
| [QubesOS] "Standalone Hardware Virtual Machine"Any HVM which is standalone (i.e., does not depend on any other VM for its root filesystem). | |||
| MVMautonome | |||
| Machine virtuelle matérielle autonome | |||
|- | |- | ||
| | | Standard Fields | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Stem | ||
| Noun | |||
| [Tor] "Stem is a Python(programming language) controller library for core Tor. If you want to control core Tor with python, this is for you." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | Sticker Pack | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Street Address | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Subtitle | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | Sure | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Surname | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Sweatshirt | ||
| | |||
| | |||
| chandail en coton molletonné | |||
| | |||
|- | |- | ||
| | | Sybil attack | ||
| Noun | |||
| [Tor] "The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | Sync | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Sync Manager | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Sys admin | ||
| Noun | |||
| Synonym: system admin, system administrator | |||
| administrateur de système | |||
| | |||
|- | |- | ||
| | | TLS | ||
| Noun | |||
| [TunnelBear]"Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers." - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security) | |||
| | |||
| | |||
|- | |- | ||
| | | TOFU | ||
| Noun | |||
| Trust on first use:https://en.wikipedia.org/wiki/Trust_on_first_use | |||
| CÀPU | |||
| Confiance à la première utilisation :https://en.wikipedia.org/wiki/Trust_on_first_use | |||
|- | |- | ||
| | | TRIM | ||
| Noun | |||
| [VeraCrypt] "A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally." https://en.wikipedia.org/wiki/Trim_(computing) | |||
| | |||
| | |||
|- | |- | ||
| | | TRIM command | ||
| Noun | |||
| [VeraCrypt] "A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally." https://en.wikipedia.org/wiki/Trim_(computing) | |||
| | |||
| | |||
|- | |- | ||
| | | TTL | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Tails | ||
| Noun | |||
| [Tor] **Do not translate** Tails is an acronym for "The Amnesic Incognito Live System". "Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails." (Source: Tor Glossary) | |||
| Tails | |||
| | |||
|- | |- | ||
| | | Tails Installer | ||
| | |||
| | |||
| [Tails] Installeur de Tails | |||
| | |||
|- | |- | ||
| | | Tails Installer | ||
| Noun | |||
| [Tor] **Do not translate** Tails is an acronym for "The Amnesic Incognito Live System". "Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails." (Source: Tor Glossary) | |||
| programme d’installation de Tails | |||
| | |||
|- | |- | ||
| | | Take a stand | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Tamanho | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | TemplateBasedHVM | ||
| Noun | |||
| [QubesOS] "Template-Based Hardware Virtual Machine"Any HVM that depends on a TemplateVM for its root filesystem. | |||
| MVMsurModèle | |||
| | |||
|- | |- | ||
| | | TemplateBasedVM | ||
| Noun | |||
| [QubesOS] "Template-Based Virtual Machine"Any VM which depends on a TemplateVM for its root filesystem. | |||
| MVsurModèle | |||
| | |||
|- | |- | ||
| | | TemplateHVM | ||
| Noun | |||
| [QubesOS] "Template Hardware Virtual Machine"Any HVM which functions as a TemplateVM by supplying [QubesOS] its root filesystem to other VMs. | |||
| MVMModèle | |||
| Machine virtuelle matérielle modèle | |||
|- | |- | ||
| | | TemplateVM | ||
| Noun | |||
| [QubesOS] "Template Virtual Machine."Any VM which supplies its root filesystem to another VM. | |||
| MVModèle | |||
| | |||
|- | |- | ||
| | | Terms | ||
| Noun | |||
| [Outline] As in "terms of service" | |||
| | |||
| | |||
|- | |- | ||
| | | Terms & Privacy Policy | ||
| Noun | |||
| [Signal] | |||
| Conditions générales et politique de confidentialité | |||
| [Signal] | |||
|- | |- | ||
| | | Terms of Service | ||
| Noun | |||
| [Outline] | |||
| conditions générales d'utilisation | |||
| | |||
|- | |- | ||
| | | Text message | ||
| Noun | |||
| Synonym: SMS | |||
| texto | |||
| | |||
|- | |- | ||
| | | Thanks You | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Throwaway | ||
| Noun | |||
| A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF) | |||
| Téléphone mobile jetable | |||
| Un téléphone qui n’est pas relié à votre identité, n’est utilisé que pour un nombre limité d’appels ou d’activités et qui peut être jeté, le cas échéant, si vous soupçonnez qu’il est suivi à la trace ou compromis. Les téléphones jetables sont souvent des téléphones mobiles prépayés, achetez comptant.Source EFF. | |||
|- | |- | ||
| | | Throwaway address | ||
| Noun | |||
| An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.Source EFF. | |||
| Adresse jetable | |||
| Une adresse courriel que vous utilisez une seule fois et plus jamais par la suite. Elle est utilisée pour se connecter à un service Internet sans révéler une adresse courriel associée à votre identité.Source EFF. | |||
|- | |- | ||
| | | Timestamp | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Toolkit | ||
| Noun | |||
| | |||
| boîte à outils | |||
| | |||
|- | |- | ||
| | | Tools | ||
| Noun | |||
| [Martus] Martus menu option. | |||
| Outils | |||
| | |||
|- | |- | ||
| | | Tor | ||
| Noun | |||
| [Orbot] | |||
| Tor | |||
| | |||
|- | |- | ||
| | | Tor Blog | ||
| Noun | |||
| | |||
| Blogue de Tor | |||
| | |||
|- | |- | ||
| and | | Tor Browser | ||
| Noun | |||
| [Tor] **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) "Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and from anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real Internet (IP) address, and will not know who you are unless you explicitly identify yourself. In addition, Tor Browser is designed to prevent websites from “fingerprinting” or identifying you based on your browser configuration. By default, Tor Browser does not keep any browsing history. Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested)." (Source: Tor Glossary) | |||
| Navigateur Tor. | |||
| Toujours avec une majuscule au début de chacun des deux mots. | |||
|- | |- | ||
| | | Tor Browser Bundle | ||
| Noun | |||
| **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) | |||
| offre groupée du Navigateur Tor | |||
| Toujours avec une majuscule au début de chacun des deux mots. | |||
|- | |- | ||
| | | Tor Browser profile directory | ||
| Noun | |||
| **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) | |||
| répertoire de profil du Navigateur Tor | |||
| Toujours avec une majuscule au début de chacun des deux mots. | |||
|- | |- | ||
| | | Tor Launcher | ||
| Noun | |||
| [Tor] **Do not translate or transcribe "Tor"** "When you run Tor Browser for the first time, you see the Tor Launcher window. It offers you the option to connect directly to the Tor network, or to configure Tor Browser for your connection. In the second case Tor Launcher will take you through a series of configuration options." (Source: Tor Glossary) | |||
| Lanceur Tor | |||
| | |||
|- | |- | ||
| | | Tor Network Settings | ||
| Noun | |||
| | |||
| paramètre du réseau Tor | |||
| | |||
|- | |- | ||
| | | Tor News | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Tor Project | ||
| Noun | |||
| [Orbot, Tor] **Do not translate.** Organization name. Name can be transcribed dependent on language. "The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor." (Source: Tor Glossary) | |||
| Projet Tor | |||
| | |||
|- | |- | ||
| | | Tor bridge | ||
| Noun | |||
| [Tor] | |||
| | |||
| | |||
|- | |- | ||
| | | Tor log | ||
| Noun | |||
| [Tor] ""Tor log" is an automatically-generated list of Tor’s activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". If you don't see this option and you have Tor Browser open, you can navigate to the Torbutton (on the top left of the browser, to the left of the URL bar). Click the Tor button, then open Tor Network Settings. You should see an option at the bottom to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | Tor messenger | ||
| Noun | |||
| [The Tor Project] | |||
| Messagerie Tor | |||
| [Le projet Tor] Toujours avec uns majuscule pour les deux mots. | |||
|- | |- | ||
| | | Tor network | ||
| Noun | |||
| [Tor] "Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues." (Source: Tor Glossary) | |||
| réseau Tor | |||
| | |||
|- | |- | ||
| | | Tor relay | ||
| Noun | |||
| [Tor] [Orbot] | |||
| relais Tor | |||
| [Le Projet Tor] | |||
|- | |- | ||
| | | Tor2Web | ||
| Noun | |||
| [Tor, Globaleaks] **Do not translate** "Tor2web is a project to let users access onion services without using the Tor Browser. NOTE: This is not as safe as connecting to the onion services via Tor Browser, and will remove all Tor-related protections the client would otherwise have." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | TorBirdy | ||
| Noun | |||
| [Tor] **Do not translate** "This extension configures Thunderbird to make connections over Tor." (Source: Tor Glossary) | |||
| TorBirdy | |||
| | |||
|- | |- | ||
| | | Torbutton | ||
| Noun | |||
| [Tor] "A button marked by a little green onion to the left of the URL bar. Its menu offers you "New Identity", "Security Settings..." and "Check for Tor Browser Update..." options." (Source: Tor Glossary) | |||
| BoutonTor | |||
| Toujours avec deux majuscules. | |||
|- | |- | ||
| | | Touch ID | ||
| Noun | |||
| [Signal] Specific to iOS | |||
| | |||
| | |||
|- | |- | ||
| | | Trademark | ||
| Noun | |||
| | |||
| marque de commerce | |||
| | |||
|- | |- | ||
| | | Twitter | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Two-Factor | ||
| Noun | |||
| | |||
| à deux facteurs | |||
| | |||
|- | |- | ||
| | | UDP | ||
| Noun | |||
| [Outline] Short for "User Datagram Protocol"Wikipedia: https://en.wikipedia.org/wiki/User_Datagram_Protocol | |||
| | |||
| | |||
|- | |- | ||
| | | UI | ||
| Noun | |||
| user interface | |||
| IU | |||
| interface utilisateur | |||
|- | |- | ||
| | | URL | ||
| Noun | |||
| [CGIProxy] | |||
| URL | |||
| | |||
|- | |- | ||
| | | URL bar | ||
| Noun | |||
| | |||
| barre d’URL | |||
| | |||
|- | |- | ||
| | | US $ | ||
| Noun | |||
| "USD" or "United States Dollar" | |||
| | |||
| | |||
|- | |- | ||
| | | USB drive | ||
| Noun | |||
| Specifically thumbdrives used as external storage. | |||
| clé USB | |||
| | |||
|- | |- | ||
| | | USB stick | ||
| Noun | |||
| | |||
| clé USB | |||
| | |||
|- | |- | ||
| | | UTF-16 | ||
| Noun | |||
| [CGIProxy] "UTF-16 (16-bit Unicode Transformation Format) is a character encoding capable of encoding all 1,112,064 valid code points of Unicode. The encoding is variable-length, as code points are encoded with one or two 16-bit code units (also see comparison of Unicode encodings for a comparison of UTF-8, -16 & -32)." Wikipedia: https://en.wikipedia.org/wiki/UTF-16 | |||
| | |||
| | |||
|- | |- | ||
| | | UTF-8 | ||
| Noun | |||
| [CGIProxy] "UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes." Wikipedia: https://en.wikipedia.org/wiki/UTF-8 | |||
| | |||
| | |||
|- | |- | ||
| | | UpdateVM | ||
| Noun | |||
| [QubesOS] | |||
| MVMiseàJour | |||
| | |||
|- | |- | ||
| | | Uploaded | ||
| Adjective | |||
| [Globaleaks] | |||
| téléversé | |||
| | |||
|- | |- | ||
| | | UsbVM | ||
| Noun | |||
| [QubesOS] | |||
| MVUsb | |||
| | |||
|- | |- | ||
| | | VM | ||
| Noun | |||
| [Qubes, Outline] "virtual machine" | |||
| | |||
| | |||
|- | |- | ||
| | | VPN | ||
| Noun | |||
| [Outline, Orbot, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.Synonyms: Virtual Private NetworkSource: EFF | |||
| RPV | |||
| Un réseau privé virtuel est un moyen de connecter votre ordinateur en toute sécurité au réseau d’une organisation à l’autre bout d’Internet. Quand vous utilisez un RPV, toutes les communications Internet de votre ordinateur sont compressées, chiffrées puis relayées vers cette autre organisation où elles sont déchiffrées, décompressées et envoyées ensuite à destination. Aux yeux du réseau de l’organisation ou de tout autre ordinateur sur Internet, la requête de votre ordinateur semble venir de l’intérieur de l’organisation, non d’un autre lieu. Les RPV sont utilisés par les entreprises pour fournir un accès sécurisé à des ressources internes (comme des serveurs de fichiers ou des imprimantes). Ils sont aussi utilisés par des individus pour contourner la censure et la surveillance locales.Synonyme : Réseau privé virtuelSource FFÉ. | |||
|- | |- | ||
| | | Vanilla Bridges | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Vidalia | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | Virtual Machine (VM) | ||
| Noun | |||
| A software implementation of a machine (for example, a computer) which executes programs like a physical machine. | |||
| machine virtuelle (MV) | |||
| L’implémentation logicielle d'une machine (p. ex. un ordinateur) qui exécute des programmes comme une machine physique. | |||
|- | |- | ||
| | | Virtual Private Network (VPN) | ||
| Noun | |||
| [Outline, Orbot, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF) | |||
| Réseau privé virtuel (RPV) | |||
| Un réseau privé virtuel est un moyen de connecter votre ordinateur en toute sécurité au réseau d’une organisation à l’autre bout d’Internet. Quand vous utilisez un RPV, toutes les communications Internet de votre ordinateur sont compressées, chiffrées puis relayées vers cette autre organisation où elles sont déchiffrées, décompressées et envoyées ensuite à destination. Aux yeux du réseau de l’organisation ou de tout autre ordinateur sur Internet, la requête de votre ordinateur semble venir de l’intérieur de l’organisation, non d’un autre lieu.Les RPV sont utilisés par les entreprises pour fournir un accès sécurisé à des ressources internes (comme des serveurs de fichiers ou des imprimantes). Ils sont aussi utilisés par des individus pour contourner la censure et la surveillance locales.Synonyme : RPV.Source FFÉ. | |||
|- | |- | ||
| | | Virtual Private Network, VPN | ||
| Noun | |||
| [Orbot, Outline, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF) | |||
| | |||
| | |||
|- | |- | ||
| | | Virtual Private Server (VPS) | ||
| Noun | |||
| [Outline] Virtual Private Server | |||
| Serveur privé virtuel | |||
| | |||
|- | |- | ||
| | | VoIP Call | ||
| Noun | |||
| | |||
| appel voix sur IP | |||
| | |||
|- | |- | ||
| | | Voice over IP (VoIP) | ||
| Noun | |||
| Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.Synonyms: VoIP.Source EFF. | |||
| Voix sur IP | |||
| Toute technologie qui vous permet d’utiliser Internet pour des communications vocales avec d’autres utilisateurs d’un système voix sur IP ou pour recevoir des appels téléphoniques par Internet | |||
|- | |- | ||
| | | Volume Creation Wizard | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | WAN | ||
| Noun | |||
| | |||
| réseau étendu | |||
| | |||
|- | |- | ||
| | | WWW-Authenticate header | ||
| Noun | |||
| [CGIProxy] | |||
| | |||
| | |||
|- | |- | ||
| | | Warning! | ||
| Interjection | |||
| ex: “Warning! Selecting 'OK' will permanently delete all files” | |||
| | |||
| | |||
|- | |- | ||
| | | Web Key Directory | ||
| Noun | |||
| | |||
| annuaire de clés Web | |||
| | |||
|- | |- | ||
| | | WebApp | ||
| Noun | |||
| | |||
| appli Web | |||
| | |||
|- | |- | ||
| | | Welcome | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | WhisperBack | ||
| Noun | |||
| "WhisperBack" is an application written specifically to report bugs anonymously from inside Tails. | |||
| WhisperBack | |||
| | |||
|- | |- | ||
| | | WiFi | ||
| Noun | |||
| | |||
| Wi-FI | |||
| | |||
|- | |- | ||
| | | Windows | ||
| Noun | |||
| Operating system | |||
| | |||
| | |||
|- | |- | ||
| | | Work | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | World Wide Web | ||
| Noun | |||
| | |||
| Web | |||
| | |||
|- | |- | ||
| | | XMPP | ||
| Noun | |||
| [Signal] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. | |||
| Protocole XMPP | |||
| Une norme ouverte pour la messagerie instantanée. Google utilise le protocole XMPP pour Google Talk, Facebook l’offrait, mais ce n’est plus le cas. Les services de messagerie instantanée indépendants qui n’appartiennent pas aux grandes sociétés utiliseront habituellement XMPP. Les services comme WhatsApp ont leur propre protocole fermé et secret.Source EFF. | |||
|- | |- | ||
| | | XSS | ||
| Noun | |||
| | |||
| script intersites | |||
| | |||
|- | |- | ||
| | | XXL | ||
| Noun | |||
| Extra extra large. Clothing size. | |||
| | |||
| | |||
|- | |- | ||
| | | YYYY | ||
| Noun | |||
| “Year” Indicates that user must input a 4-digit year (ex: 1990) | |||
| | |||
| | |||
|- | |- | ||
| | | Zip | ||
| Noun | |||
| Abbreviation of 'Zip Code' or 'Postal Code' | |||
| | |||
| | |||
|- | |- | ||
| | | accept | ||
| Verb | |||
| [Signal] | |||
| accepter | |||
| | |||
|- | |- | ||
| | | access | ||
| Noun | |||
| | |||
| accès | |||
| | |||
|- | |- | ||
| | | access | ||
| Verb | |||
| | |||
| accéder | |||
| | |||
|- | |- | ||
| | | access key | ||
| Noun | |||
| [Outline] | |||
| | |||
| | |||
|- | |- | ||
| | | access mode | ||
| Noun | |||
| | |||
| mode d’accès | |||
| Suivant le contexte | |||
|- | |- | ||
| | | access token | ||
| Noun | |||
| [Martus]Short identification number used to add Contacts to your Martus account. | |||
| jeton d’accès | |||
| | |||
|- | |- | ||
| | | accessibility | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | account | ||
| Noun | |||
| | |||
| compte | |||
| | |||
|- | |- | ||
| | | account recovery | ||
| Noun | |||
| [Mailvelope] | |||
| récupération de compte | |||
| | |||
|- | |- | ||
| | | account recovery code | ||
| Noun | |||
| [Mailvelope] | |||
| code de récupération de compte | |||
| | |||
|- | |- | ||
| | | accountability | ||
| Noun | |||
| | |||
| imputabilité | |||
| | |||
|- | |- | ||
| | | acknowledge | ||
| Verb | |||
| An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment" | |||
| reconnaître | |||
| Synonymes : accuser réception, approuver[Peerio] approuver | |||
|- | |- | ||
| | | acknowledged | ||
| Adjective | |||
| An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment" | |||
| approuvé | |||
| [Peerio] | |||
|- | |- | ||
| | | acknowledgment | ||
| Noun | |||
| American English — A button in Peerio that functions similar to a message, but sends a "thumbs up" icon with a timestamp. The thumbs-up icon is referred to as an "acknowledgment" | |||
| reconnaissance | |||
| Synonymes : accusé de réception, approbation.[Peerio] approbation | |||
|- | |- | ||
| | | acquire | ||
| Verb | |||
| | |||
| acquérir | |||
| | |||
|- | |- | ||
| | | activate | ||
| Verb | |||
| [Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | active | ||
| Adjective | |||
| | |||
| actif | |||
| | |||
|- | |- | ||
| | | activist | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | activity | ||
| Noun | |||
| [SAFETAG] In the context of SAFETAG: The practices and interactions that the organization carries out in order to accomplish their goals. | |||
| activité | |||
| | |||
|- | |- | ||
| | | actor | ||
| Noun | |||
| [SAFETAG] In the context of SAFETAG: The staff, volunteers, partners, beneficiaries, donors, and adversaries associated with the organization. | |||
| | |||
| | |||
|- | |- | ||
| | | ad provider | ||
| Noun | |||
| [Psiphon] | |||
| fournisseur de publicité | |||
| | |||
|- | |- | ||
| | | ad-blocker | ||
| Noun | |||
| | |||
| bloqueur de publicité | |||
| | |||
|- | |- | ||
| | | add | ||
| Verb | |||
| | |||
| ajouter | |||
| | |||
|- | |- | ||
| | | add-on | ||
| Noun | |||
| [Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF) | |||
| greffon | |||
| Un logiciel qui modifie une autre application, changeant son fonctionnement et ce qu’elle peut faire. Les greffons peuvent souvent ajouter des fonctions de confidentialité ou de sécurité aux navigateurs Web ou aux logiciels de courriel. Certains greffons sont malveillants, veillez donc à n’installer que des greffons réputés provenant de sources officielles.Dans Chrome > extensionDans Firefox > module complémentaireSynonymes : extensions, plugiciels.Source FFÉ. | |||
|- | |- | ||
| | | additional software | ||
| | |||
| | |||
| [Tails] logiciel additionnel | |||
| | |||
|- | |- | ||
| | | address | ||
| Noun | |||
| | |||
| adresse | |||
| | |||
|- | |- | ||
| | | address | ||
| Verb | |||
| (1) To address a situationSynonyms: to fix, to take care of(2) Give to data or a data set an address in memory(3) If a letter, envelope, or parcel is addressed to you, your name and address have been written on it. | |||
| remédier | |||
| (1) Synonymes : régler, résoudre, corriger une situation(2) Donner à un ensemble de données ou à une donnée une adresse en mémoire(3) Si une lettre, une enveloppe ou un paquet vous est adressé, vos nom et adresse ont été écrits dessus. | |||
|- | |- | ||
| | | address bar | ||
| Noun | |||
| | |||
| barre d’adresse | |||
| | |||
|- | |- | ||
| | | address book | ||
| Noun | |||
| | |||
| carnet d’adresses | |||
| | |||
|- | |- | ||
| | | admin | ||
| Noun | |||
| [Outline] Short for "administrator". | |||
| | |||
| | |||
|- | |- | ||
| | | administrative | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | advance | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | advanced | ||
| Adjective | |||
| | |||
| avancé | |||
| Synonymes : évolué, sophistiqué | |||
|- | |- | ||
| | | advanced options | ||
| Noun | |||
| | |||
| options évoluées | |||
| Synonyme : options avancées | |||
|- | |- | ||
| | | advanced search | ||
| Noun | |||
| [Martus] | |||
| recherche approfondie | |||
| | |||
|- | |- | ||
| | | advanced user | ||
| Noun | |||
| | |||
| utilisateur expérimenté | |||
| | |||
|- | |- | ||
| | | adversary | ||
| Noun | |||
| Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.Source EFF. | |||
| adversaire | |||
| Votre adversaire est la personne ou l’organisation qui tente de miner vos objectifs de sécurité. Les adversaires diffèrent selon la situation. Vous pourriez par exemple vous soucier de criminels qui vous espionneraient sur le réseau d’un café ou encore de vos compagnons de classe. L’adversaire est souvent hypothétique.Source FFÉ. | |||
|- | |- | ||
| | | agency building | ||
| Noun | |||
| [SAFETAG] "...building the organization's agency" To increase an organization's ability to make decisions and do things on their own. | |||
| | |||
| | |||
|- | |- | ||
| | | agent | ||
| Noun | |||
| | |||
| agent | |||
| | |||
|- | |- | ||
| | | air gap | ||
| Noun | |||
| A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.Source EFF.An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated from all other networks.Source Wikipedia | |||
| isolement | |||
| Un ordinateur ou un réseau est isolé quand il est physiquement tenu à l’écart de tous les autres réseaux, incluant Internet.Source FFÉ. | |||
|- | |- | ||
| | | air-gapped (air gapped) | ||
| Adjective | |||
| | |||
| isolé | |||
| isolé dans le réseau | |||
|- | |- | ||
| | | alpha | ||
| Noun | |||
| | |||
| version alpha | |||
| | |||
|- | |- | ||
| | | alternate | ||
| Adjective | |||
| | |||
| de substitution | |||
| Synonymes : de substitution, de remplacement, de rechange, alternant, alterné, cyclique, en alternance, périodique, alternatif, autre. | |||
|- | |- | ||
| | | alternate | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | alternative | ||
| Adjective | |||
| | |||
| de substitution | |||
| Synonymes : de substitution, de remplacement, de rechange, alternant, alterné, cyclique, en alternance, périodique, alternatif, autre. | |||
|- | |- | ||
| | | alternative | ||
| Noun | |||
| | |||
| alternative | |||
| Synonymes : substitut, remplacement, solution, solution de remplacement, solution de rechange, autre possibilité, possibilité, éventualité, option, choix.Le mot alternative communique un choix entre deux possibilités (se trouver devant une alternative difficile), alternance (au pluriel) (des alternatives de chaud et de froid), contrairement au terme anglais « alternative » qui désigne chacune des possibilités. | |||
|- | |- | ||
| | | ambiguous | ||
| Adjective | |||
| | |||
| ambigu | |||
| | |||
|- | |- | ||
| | | analytics | ||
| Noun | |||
| | |||
| analyse | |||
| Synonyme : Procédures analytiques. | |||
|- | |- | ||
| | | anomaly | ||
| Noun | |||
| [Globaleaks] | |||
| anomalie | |||
| | |||
|- | |- | ||
| | | anonymity | ||
| Noun | |||
| [Orbot, CGIProxy] | |||
| anonymat | |||
| | |||
|- | |- | ||
| | | anonymization | ||
| Noun | |||
| "It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous." (Source: https://en.wikipedia.org/wiki/Data_anonymization) | |||
| anonymisation | |||
| Supprimer des informations nominatives se trouvant dans un document afin de rendre virtuellement impossible l’identification des personnes. | |||
|- | |- | ||
| | | anonymize | ||
| Verb | |||
| [Orbot, Signal, Outline] To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization) | |||
| anonymiser | |||
| Supprimer des informations nominatives se trouvant dans un document afin de rendre virtuellement impossible l’identification des personnes. | |||
|- | |- | ||
| | | anonymous | ||
| Adjective | |||
| [Orbot, Outline] | |||
| anonyme | |||
| | |||
|- | |- | ||
| | | antivirus | ||
| Noun | |||
| [Outline, Tor] Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.Source EFF. | |||
| antivirus | |||
| Un logiciel qui tente de protéger un appareil contre l’emprise d’un programme malveillant. Les virus étaient parmi les premiers programmes malveillants et les plus répandus. Ils étaient appelés virus pour refléter la façon dont ils se propageaient d’appareil en appareil. De nos jours, la plupart des logiciels antivirus se concentrent sur deux choses : vous avertir si vous vous apprêtez à télécharger un fichier suspect d’une source externe et examiner les fichiers sur votre ordinateur pour vérifier s’ils correspondent à l’idée que le logiciel se fait d’un programme malveillant.Un logiciel antivirus ne peut reconnaître des programmes malveillants que s’ils sont pour l’essentiel semblables aux échantillons que les développeurs du programme antivirus ont déjà analysés. C’est pour cela qu’il est bien moins efficace pour combattre un programme malveillant ciblé, conçu pour infiltrer une communauté ou une personne précise, plutôt que des souches virales malveillantes répandues. Certains programmes malveillants sophistiqués peuvent attaquer activement un logiciel antivirus ou s’y soustraire.Source FFÉ. | |||
|- | |- | ||
| | | app | ||
| Noun | |||
| [Orbot, Tor] Abbreviation of "application." (Synonyms: application) | |||
| appli | |||
| Au pluriel, on écrira : des applis. | |||
|- | |- | ||
| | | app switcher | ||
| Noun | |||
| [Signal] Specific to iOS | |||
| sélecteur d’applis | |||
| | |||
|- | |- | ||
| | | application | ||
| Noun | |||
| [Orbot] An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. (Source: https://en.wikipedia.org/wiki/Application_software) [Signal] | |||
| application | |||
| Ensemble de programmes qui aident un utilisateur à accomplir une tâche donnée. Synonymes : logiciel d’application, application, programme d’application, logiciel applicatif, applicatif. | |||
|- | |- | ||
| | | apply | ||
| Verb | |||
| | |||
| appliquer | |||
| | |||
|- | |- | ||
| | | approach | ||
| Noun | |||
| | |||
| approche | |||
| Manière d’aborder une question, un problème. Synonymes : approche, méthode, démarche, optique, point de vue, manière de voir. | |||
|- | |- | ||
| | | approve | ||
| Verb | |||
| | |||
| approuver | |||
| | |||
|- | |- | ||
| | | archive | ||
| Noun | |||
| An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.https://en.wikipedia.org/wiki/Archive_file | |||
| fichier compressé | |||
| Fichier dont les données sont compressées à l’aide d’un algorithme afin d’économiser de l’espace disque.Synonymes : fichier comprimé, exécutable compressé. | |||
|- | |- | ||
| | | archive | ||
| Verb | |||
| [Signal] | |||
| archiver | |||
| Écrire un document de la mémoire interne vers un support externe. | |||
|- | |- | ||
| | | argument | ||
| Noun | |||
| | |||
| argument | |||
| Nombre ou chaîne de caractères qui précise une commande et qui influence son fonctionnement. | |||
|- | |- | ||
| | | arrive | ||
| Verb | |||
| | |||
| arriver | |||
| | |||
|- | |- | ||
| | | article | ||
| Noun | |||
| | |||
| article | |||
| | |||
|- | |- | ||
| | | as root | ||
| Noun | |||
| | |||
| en tant que superutilisateur | |||
| | |||
|- | |- | ||
| | | asset | ||
| Noun | |||
| In threat modeling, any piece of data or a device that needs to be protected.Source EFF. | |||
| actif | |||
| En modélisation de la menace, toute donnée ou tout appareil qui a besoin d’être protégé.Source EFF. | |||
|- | |- | ||
| | | asymmetric-key encryption | ||
| Noun | |||
| Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for messaging, and SSL/TLS for web browsing.Synonyms: Public key encryption, Public key cryptography. Source: EFF | |||
| chiffrement par clé asymétrique | |||
| Les systèmes de chiffrement traditionnels utilisent le même secret ou clé pour chiffrer et déchiffrer un message. Donc si je chiffre un fichier avec le mot de passe « monstrebleutonique », il vous faudra à la fois le fichier et le secret « monstrebleutonique » pour le décoder. Le chiffrement par clé publique utilise deux clés : l’une pour chiffrer et l’autre pour déchiffrer. Les conséquences utiles sont nombreuses. L’une est que vous pouvez donner la clé pour que l’on chiffre des messages à votre intention et que tant que vous conserverez l’autre clé secrète, quiconque possède cette clé peut communiquer avec vous en toute sécurité. La clé que vous distribuez est appelée « clé publique », d’où le nom de la technique. Le chiffrement par clé publique est utilisé pour chiffrer les courriels et les fichiers avec PGP, OTR pour la messagerie instantanée et SSL/TLS pour la navigation Web.Synonymes : chiffrement par clé publique, cryptographie par clé publique.Source FFÉ. | |||
|- | |- | ||
| | | at the Heart of Internet Freedom | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | attach | ||
| Verb | |||
| To attach a file to a message | |||
| joindre | |||
| Synonyme : annexer | |||
|- | |- | ||
| | | attachment | ||
| Noun | |||
| [Signal] File sent together with an email or other electronic message. | |||
| fichier joint | |||
| Fichier annexé à un message électronique, courriel ou autre, récupérable par le destinataire. Synonyme : pièce jointe., p. j., fichier annexé. | |||
|- | |- | ||
| | | attack | ||
| Noun | |||
| In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."Source EFF. | |||
| attaque | |||
| En sécurité informatique, une attaque est une méthode qui peut être utilisée pour compromettre la sécurité ou l’utilisation même d’un système. Un attaquant est la personne ou l’organisation menant l’attaque. Une méthode d’attaque est parfois appelée « exploitation ».Source FFÉ. | |||
|- | |- | ||
| | | attacker | ||
| Noun | |||
| | |||
| assaillant | |||
| | |||
|- | |- | ||
| | | audio | ||
| Adjective | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | audio | ||
| Noun | |||
| | |||
| audio | |||
| Relatif aux sons, aux enregistrements, à la reproduction.Au pluriel, l’adjectif audio peut rester invariable ou prendre un s conformément à l’orthographe rectifiée des fichiers audio ou audios, des équipements audio ou audios. | |||
|- | |- | ||
| | | audit | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | auditor | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | auth token | ||
| Noun | |||
| [Orbot] | |||
| jeton d’authentification | |||
| | |||
|- | |- | ||
| | | authenticate | ||
| Verb | |||
| | |||
| authentifier | |||
| Contrôler l’identité déclarée d’une personne ou autre entité. Garantir l’origine et l’intégrité des messages transitant par un réseau informatique.Synonyme : prouver l’identité. | |||
|- | |- | ||
| | | authenticated | ||
| Adjective | |||
| | |||
| authentifié | |||
| | |||
|- | |- | ||
| | | authentication | ||
| Noun | |||
| [TunnelBear, CGIProxy, Signal] | |||
| authentification | |||
| Vérification ou validation de l’identité d’une personne ou autre entité. Contrôle de l’accès à un réseau informatique, à un système ou programme. Elle peut faire appel à des techniques de cryptographie asymétrique, à des identifiants (nom d’utilisateur ou NIP), aux mots ou phrases de passe et aux signatures numériques associées. | |||
|- | |- | ||
| | | author | ||
| Noun | |||
| | |||
| auteur | |||
| | |||
|- | |- | ||
| | | authority | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | authorize | ||
| Verb | |||
| | |||
| autoriser | |||
| Synonyme : donner un droit d’usage | |||
|- | |- | ||
| | | automated traffic | ||
| Noun | |||
| | |||
| trafic automatisé | |||
| | |||
|- | |- | ||
| | | autonomous system number | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | availability | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | available | ||
| Adjective | |||
| | |||
| proposé, offert, disponible | |||
| En français, le mot disponible signifie :Dont on peut disposer (documentation disponible pour consultation), qui n’est pas occupé, libre (je suis disponible les fins de semaine). Il constitue un anglicisme si on lui donne le sens de :* offert (la nouvelle version est disponible dès janvier)* en vente, sur le marché (un logiciel disponible à bon prix).En informatique et télécommunication, « disponible » qualifie un état ou une condition permettant à une unité fonctionnelle d’accomplir une fonction requise lorsque les ressources externes nécessaires sont accessibles et que l’unité fonctionnelle est sous la commande de l’utilisateur. Synonymes : offert, proposé, disponible, libre. | |||
|- | |- | ||
| | | avatar | ||
| Noun | |||
| A computer generated visual icon used as an alternative digital fingerprint. aka "identicon". [Signal] | |||
| avatar | |||
| * Personnage numérique, réaliste ou fantaisiste, qui représente le joueur ou l’utilisateur dans un monde virtuel* Icône générée par ordinateur utilisée comme empreinte numérique.Synonyme : identicône | |||
|- | |- | ||
| | | back | ||
| Adverb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | back | ||
| Noun | |||
| As in “Back” button | |||
| retour | |||
| Bouton Retour | |||
|- | |- | ||
| | | back | ||
| Verb | |||
| As in "to back up" or "to back down". | |||
| | |||
| | |||
|- | |- | ||
| | | back up | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | backend | ||
| Noun | |||
| Backend app. | |||
| Dorsale | |||
| Appli dorsale. | |||
|- | |- | ||
| | | background | ||
| Noun | |||
| Screen surface where text and graphic elements are displayed | |||
| arrière-plan | |||
| Zone de l’écran sur laquelle les éléments graphiques et textuels apparaissent | |||
|- | |- | ||
| | | background process | ||
| Noun | |||
| | |||
| processus d’arrière-plan | |||
| | |||
|- | |- | ||
| | | background program | ||
| Noun | |||
| | |||
| programme d’arrière-plan | |||
| | |||
|- | |- | ||
| | | backlog | ||
| Noun | |||
| Delayed processing of some sort | |||
| arriéré | |||
| Retard dans un domaine quelconque | |||
|- | |- | ||
| | | backup | ||
| Noun | |||
| [Signal] [Orbot] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. | |||
| sauvegarde | |||
| Copie de données, mise à jour régulièrement ou non afin d’en permettre la restauration en cas de perte. Elle peut être enregistrée localement, dans le nuage ou sur un support amovible tel un disque optique ou une clé USB. Cette dernière option permet de stocker les sauvegardes en sécurité. | |||
|- | |- | ||
| | | backup key file | ||
| Noun | |||
| [Martus] Also: key backup | |||
| | |||
| | |||
|- | |- | ||
| | | badge | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | balance | ||
| Noun | |||
| What is left to be paid or recovered. | |||
| solde | |||
| Ce qui reste d’une somme à payer ou à recouvrer. | |||
|- | |- | ||
| | | bandwidth | ||
| Noun | |||
| [Tor][Orbot] | |||
| bande passante | |||
| | |||
|- | |- | ||
| | | bank fees | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bar | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bar chart | ||
| Noun | |||
| | |||
| graphique à barres | |||
| | |||
|- | |- | ||
| | | bare-metal | ||
| Adjective | |||
| | |||
| nu | |||
| Aussi : vierge, sans système d’exploitation | |||
|- | |- | ||
| | | barrier | ||
| Noun | |||
| [SAFETAG] Barriers are specific challenges an organization faces that might limit or block its capacity. | |||
| | |||
| | |||
|- | |- | ||
| | | base | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | batch select | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | battery | ||
| Noun | |||
| | |||
| pile | |||
| Il ne faut pas confondre la pile et la batterie. Une batterie est un assemblage constitué d'au moins deux piles. En français, le mot batterie est souvent employé à tort pour désigner une seule pile, la plupart du temps rechargeable. | |||
|- | |- | ||
| | | be careful | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | benchmark | ||
| Noun | |||
| | |||
| test de performance | |||
| | |||
|- | |- | ||
| | | benign | ||
| Adjective | |||
| | |||
| inoffensif | |||
| | |||
|- | |- | ||
| | | best-effort delivery | ||
| Noun | |||
| | |||
| livraison au mieux | |||
| | |||
|- | |- | ||
| | | beta | ||
| Noun | |||
| | |||
| Bêta | |||
| | |||
|- | |- | ||
| | | big data | ||
| Noun | |||
| | |||
| mégadonnées | |||
| Ensemble des données, structurées ou non, produites en continu et en temps réel, et dont la croissance est exponentielle. | |||
|- | |- | ||
| | | billing | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | binaries | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | binary | ||
| Noun | |||
| [KeepassXC, CGIProxy] Binary file.8-bit encoded data file using only 0 and 1, different from ASCII which is 7-bit encoded. | |||
| fichier binaire | |||
| Fichier de données encodées sur 8 bits en utilisant seulement des 0 et des 1, différent d’ASCII encodé sur 7 bits. | |||
|- | |- | ||
| | | block | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | block | ||
| Noun | |||
| | |||
| blocage | |||
| | |||
|- | |- | ||
| | | block | ||
| Verb | |||
| [Signal] | |||
| bloquer | |||
| | |||
|- | |- | ||
| | | blocked | ||
| Adjective | |||
| | |||
| bloqué | |||
| | |||
|- | |- | ||
| | | blocked access | ||
| Noun | |||
| | |||
| accès bloqué | |||
| | |||
|- | |- | ||
| | | blockfile | ||
| Noun | |||
| [I2P] http://www.i2p2.de/blockfile.html | |||
| blockfile | |||
| [I2P] En référence au format de fichiers, service de noms blockfile.https://geti2p.net/spec/blockfile | |||
|- | |- | ||
| | | blocking | ||
| Noun | |||
| Synonyms: filtering, censoring Internet traffic. | |||
| blocage | |||
| Synonyme : filtrage, censure du trafic Internet. | |||
|- | |- | ||
| | | blocking resistant | ||
| Adjective | |||
| | |||
| résistant au blocage | |||
| | |||
|- | |- | ||
| | | blog | ||
| Noun | |||
| | |||
| blogue | |||
| | |||
|- | |- | ||
| | | blog post | ||
| Noun | |||
| Short text posted to a blog, the content of which is left entirely to the discretion of the author. | |||
| billet, article | |||
| Court texte qui est publié dans un blogue et dont le contenu est à l'entière discrétion de l’auteur.Synonyme : billet de bloqueSi le texte est plus long, on parle d’un article de blogue. | |||
|- | |- | ||
| | | blogging | ||
| Noun | |||
| Posting to a blog and updating it regularly. | |||
| blogage | |||
| Publier un blogue et à le mettre à jour régulièrement. | |||
|- | |- | ||
| | | body | ||
| Noun | |||
| | |||
| corps | |||
| | |||
|- | |- | ||
| | | bookmark | ||
| Noun | |||
| | |||
| marque-page | |||
| Synonyme : signet | |||
|- | |- | ||
| | | boolean | ||
| Adjective | |||
| [KeepassXC] | |||
| booléen | |||
| | |||
|- | |- | ||
| | | boolean | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | boot | ||
| Noun | |||
| [Orbot] | |||
| amorçage | |||
| | |||
|- | |- | ||
| | | boot | ||
| Verb | |||
| [Orbot] | |||
| amorcer | |||
| | |||
|- | |- | ||
| | | boot loader | ||
| Noun | |||
| bootloader | |||
| programme d’amorçage | |||
| | |||
|- | |- | ||
| | | bootable | ||
| Adjective | |||
| | |||
| amorçable | |||
| | |||
|- | |- | ||
| | | bootloader | ||
| Noun | |||
| Synonyms: boot loader | |||
| programme d’amorçage | |||
| | |||
|- | |- | ||
| | | bot | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | botnet | ||
| Noun | |||
| | |||
| réseau de zombies | |||
| | |||
|- | |- | ||
| | | bounce | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bouncing | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bounty | ||
| Noun | |||
| | |||
| prime | |||
| | |||
|- | |- | ||
| | | box | ||
| Noun | |||
| | |||
| boîte | |||
| | |||
|- | |- | ||
| | | break in | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bridge | ||
| Noun | |||
| [Orbot, Tor] Like ordinary Tor relays, bridges are run by volunteers; unlike ordinary relays, however, they are not listed publicly, so an adversary cannot identify them easily. Pluggable transports are a type of bridge that help disguise the fact that you are using Tor. (Source: Tor Glossary) | |||
| pont | |||
| | |||
|- | |- | ||
| | | bridge | ||
| Verb | |||
| [Tor] | |||
| relier par un pont | |||
| | |||
|- | |- | ||
| | | bridge line | ||
| Noun | |||
| [Tor] a line with the bridge configuration | |||
| ligne de pont | |||
| | |||
|- | |- | ||
| | | bridge relay | ||
| Noun | |||
| [Tor] | |||
| relais-pont | |||
| | |||
|- | |- | ||
| | | bridge type | ||
| Noun | |||
| [Tor] | |||
| | |||
| | |||
|- | |- | ||
| | | broad range | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | broadcast | ||
| Verb | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | browse | ||
| Verb | |||
| [Orbot, CGIProxy] | |||
| parcourir / naviguer | |||
| | |||
|- | |- | ||
| | | browser | ||
| Noun | |||
| [Outline, CGIProxy] web browser | |||
| navigateur | |||
| | |||
|- | |- | ||
| | | browser fingerprint | ||
| Noun | |||
| [Tor] The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.Source EFF. | |||
| empreinte de navigateur | |||
| Les diverses propriétés de votre navigateur Web ou de votre ordinateur qu’un site Web peut relever quand vous le visitez. Elles peuvent être légèrement différentes des autres navigateurs ou ordinateurs, ce qui peut être une façon de vous reconnaître même si vous ne vous connectez pas, même si votre ordinateur n’enregistre pas de témoins et même si vous vous connectez à Internet à partir d’un réseau différent à l’avenir. Par exemple, vous pourriez être la seule personne qui utilise un site particulier à partir d’un appareil réglé pour une certaine langue, avec une taille d’écran précise et qui utilise une certaine version d’un navigateur Web ; par la suite, le site pourrait réaliser qu’il s’agit de vous chaque fois que vous le visitez, même si vous ne faites rien pour divulguer votre identité.Source FFÉ. | |||
|- | |- | ||
| | | brute force attack | ||
| Noun | |||
| | |||
| attaque en force | |||
| | |||
|- | |- | ||
| | | buffer | ||
| Noun | |||
| | |||
| mémoire tampon | |||
| | |||
|- | |- | ||
| | | bug | ||
| Noun | |||
| | |||
| bogue | |||
| | |||
|- | |- | ||
| | | bug report | ||
| Noun | |||
| [Signal] | |||
| relevé de bogue | |||
| | |||
|- | |- | ||
| | | build | ||
| Verb | |||
| Build a program from its source. | |||
| compiler | |||
| Compiler un programme à partir de sa source | |||
|- | |- | ||
| | | bundle | ||
| Noun | |||
| | |||
| offre groupée | |||
| http://www.culture.fr/franceterme/result?francetermeSearchTerme=bundle&francetermeSearchDomaine=0&francetermeSearchSubmit=rechercher&action=search | |||
|- | |- | ||
| | | bundled | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | burden | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | burden | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | burner phone | ||
| Noun | |||
| A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)(Source: EFF) | |||
| téléphone jetable | |||
| Un téléphone qui n’est pas relié à votre identité, n’est utilisé que pour un nombre limité d’appels ou d’activités et qui peut être jeté, le cas échéant, si vous soupçonnez qu’il est suivi à la trace ou compromis. Les téléphones jetables sont souvent des téléphones mobiles prépayés, achetez comptant.Source FFÉ. | |||
|- | |- | ||
| | | button | ||
| Noun | |||
| | |||
| bouton | |||
| | |||
|- | |- | ||
| | | bypass | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | bytes | ||
| Noun | |||
| [KeePassXC, CGIProxy, Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | cache | ||
| Noun | |||
| | |||
| cache | |||
| | |||
|- | |- | ||
| | | cache | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cache-busting | ||
| Noun | |||
| | |||
| attaque visant à briser le cache | |||
| | |||
|- | |- | ||
| | | calendar | ||
| Noun | |||
| | |||
| calendrier | |||
| | |||
|- | |- | ||
| | | camera | ||
| Noun | |||
| | |||
| appareil photo | |||
| Dans certains cas, caméra. | |||
|- | |- | ||
| | | camouflage | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cams | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cams | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cancel | ||
| Verb | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | canonicalization | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | capability | ||
| Noun | |||
| The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.Source EFF. | |||
| possibilité d’action | |||
| La possiblité d’action d’un attaquant (dans le contexte d’une attaque) est ce qu’il peut faire pour atteindre ses objectifs. Par exemple, les services de sécurité d’un pays pourraient avoir la capacité d’écouter les appels téléphoniques, alors qu’un voisin pourrait avoir la capacité de vous surveiller de sa fenêtre. Dire qu’un attaquant a une capacité ne signifie pas nécessairement qu’il l’utilisera. Cela signifie cependant que vous devriez envisager cette possibilité et vous y préparer.Source FFÉ. | |||
|- | |- | ||
| | | capacity | ||
| Noun | |||
| [SAFETAG] Indicators of capacity include staff skills and a wide variety of resources that an organization can draw from to affect change. | |||
| | |||
| | |||
|- | |- | ||
| | | car documents | ||
| Noun | |||
| [Umbrella] | |||
| documents de bord | |||
| [Umbrella] | |||
|- | |- | ||
| | | card number | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | carjacking | ||
| Noun | |||
| | |||
| piraterie routière | |||
| | |||
|- | |- | ||
| | | carry | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | carry | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | case management | ||
| Noun | |||
| [GlobaLeaks] | |||
| gestion des cas | |||
| | |||
|- | |- | ||
| | | cash | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cash | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cc | ||
| Noun | |||
| “carbon copy” | |||
| Cc | |||
| | |||
|- | |- | ||
| | | cellular service | ||
| Noun | |||
| | |||
| service de téléphonie mobile | |||
| | |||
|- | |- | ||
| | | censor | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | censor | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | censored | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | censored | ||
| Adjective | |||
| | |||
| censuré | |||
| | |||
|- | |- | ||
| | | censorship | ||
| Noun | |||
| [Signal] | |||
| censure | |||
| | |||
|- | |- | ||
| | | cerificate | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | certificate | ||
| Noun | |||
| [TunnelBear][KeePassXC] | |||
| certificat | |||
| | |||
|- | |- | ||
| | | certificate | ||
| Verb | |||
| [TunnelBear][KeePassXC]To give a certificate | |||
| | |||
| | |||
|- | |- | ||
| | | certificate authority | ||
| Noun | |||
| | |||
| autorité de certification | |||
| | |||
|- | |- | ||
| | | certificate chain | ||
| Noun | |||
| [Globaleaks] | |||
| chaîne de certification | |||
| | |||
|- | |- | ||
| | | certificate chain file | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | certificates | ||
| Noun | |||
| Is it needed, the plural form defined here? The singular already exists. | |||
| | |||
| | |||
|- | |- | ||
| | | chain | ||
| Noun | |||
| | |||
| chaîne | |||
| | |||
|- | |- | ||
| | | change | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | change log | ||
| Noun | |||
| | |||
| journal des changements | |||
| | |||
|- | |- | ||
| | | changelog | ||
| Noun | |||
| [Tor] | |||
| journal des changements | |||
| | |||
|- | |- | ||
| | | charges | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | charges | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | charset | ||
| Noun | |||
| [CGIProxy] "...a repertoire of characters and how they were to be encoded into a stream of code units – usually with a single character per code unit." Wikipedia: https://en.wikipedia.org/wiki/Character_encoding | |||
| | |||
| | |||
|- | |- | ||
| | | chart | ||
| Noun | |||
| | |||
| graphique | |||
| | |||
|- | |- | ||
| | | chat | ||
| Noun | |||
| [Signal] | |||
| dialogue en ligne | |||
| Synonyme : clavardage | |||
|- | |- | ||
| | | chat | ||
| Verb | |||
| [Signal] | |||
| converser | |||
| | |||
|- | |- | ||
| | | check | ||
| Verb | |||
| | |||
| relever | |||
| terme employé par Thunderbird dans sa traduction, proposé ici pour maintenir la cohérence d'ensemble | |||
|- | |- | ||
| | | checking | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | checkpoint | ||
| Noun | |||
| | |||
| poste de contrôle | |||
| | |||
|- | |- | ||
| | | checksum | ||
| Noun | |||
| [Tor] Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical. (Source: Tor Glossary) | |||
| somme de contrôle | |||
| | |||
|- | |- | ||
| | | chipset | ||
| Noun | |||
| | |||
| jeu de puces | |||
| | |||
|- | |- | ||
| | | choke | ||
| Verb | |||
| | |||
| étrangler | |||
| | |||
|- | |- | ||
| | | chokepoint | ||
| Noun | |||
| | |||
| goulet d’étranglement | |||
| | |||
|- | |- | ||
| | | choker | ||
| Noun | |||
| | |||
| étrangleur | |||
| | |||
|- | |- | ||
| | | choose | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | chronic stress | ||
| Noun | |||
| | |||
| stress chronique | |||
| | |||
|- | |- | ||
| | | chunk | ||
| Verb | |||
| [CGIProxy] "Chunking is a specific feature of the HTTP 1.1 protocol...It refers to a facility that allows inconveniently large messages to be broken into conveniently-sized smaller "chunks"." Wikipedia: https://en.wikipedia.org/wiki/Chunking_(computing) | |||
| | |||
| | |||
|- | |- | ||
| | | cipher | ||
| Noun | |||
| [KeepassXC]Coding principle based on the substitution of a character by another or possibly several others, ran by a variable complexity transformation algorithm. | |||
| chiffre | |||
| Principe de codage basé sur la substitution d'un caractère par un autre ou éventuellement par plusieurs autres, exécutée grâce à un algorithme de transformation de complexité variable. | |||
|- | |- | ||
| | | ciphertext | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | circuit | ||
| Noun | |||
| [Tor, Orbot] A path through the Tor network built by clients consisting of randomly selected nodes. The circuit begins with either a bridge or a guard. Most circuits consist of three nodes - a guard or bridge, a middle relay, and an exit. Most onion services use six hops in a circuit (with the exception of single onion services), and never an exit node. You can view your current Tor circuit by clicking on the onion button in Tor Browser. (Source: Tor Glossary) | |||
| circuit | |||
| | |||
|- | |- | ||
| | | circuits | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | circuits | ||
| Noun | |||
| | |||
| circuits | |||
| | |||
|- | |- | ||
| | | circumvent | ||
| Verb | |||
| [Orbot] | |||
| contourner | |||
| | |||
|- | |- | ||
| | | circumvention | ||
| Noun | |||
| [Signal] [Orbot] | |||
| contournement | |||
| | |||
|- | |- | ||
| | | clear | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | clear | ||
| Verb | |||
| [Signal] [Orbot] | |||
| effacer | |||
| | |||
|- | |- | ||
| | | cleartext | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | click | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | click | ||
| Verb | |||
| [Signal, Outline] | |||
| sélectionner | |||
| Par souci d’accessibilité, cliquer devrait être évité et remplacer par « sélectionner » pour tous les utilisateurs qui n’ont jamais à cliquer. | |||
|- | |- | ||
| | | click and hold | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | click-to-play | ||
| Noun | |||
| | |||
| cliquer pour lire | |||
| | |||
|- | |- | ||
| | | clickjacking attack | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | client | ||
| Noun | |||
| [Signal, Tor, Orbot] As in "desktop client" or "Android client." "In Tor, a client is a node in the Tor network, typically running on behalf of one user, that routes application connections over a series of relays." (Source: Tor Glossary) | |||
| client | |||
| | |||
|- | |- | ||
| | | clipboard | ||
| Noun | |||
| [Signal] | |||
| presse-papiers | |||
| | |||
|- | |- | ||
| | | clock skew | ||
| Noun | |||
| | |||
| décalage d’horloge | |||
| | |||
|- | |- | ||
| | | close | ||
| Verb | |||
| | |||
| fermer | |||
| | |||
|- | |- | ||
| | | cloud provider | ||
| Noun | |||
| [Outline] | |||
| | |||
| | |||
|- | |- | ||
| | | cloud server | ||
| Noun | |||
| [Orbot] | |||
| serveur nuagique | |||
| | |||
|- | |- | ||
| | | cloud service | ||
| Noun | |||
| | |||
| service nuagique | |||
| | |||
|- | |- | ||
| | | cloud storage | ||
| Noun | |||
| | |||
| stockage nuagique | |||
| | |||
|- | |- | ||
| | | coarse data | ||
| Noun | |||
| Unprocessed data | |||
| données brute | |||
| Données qui n’ont pas encore été traitées. | |||
|- | |- | ||
| | | code | ||
| Noun | |||
| | |||
| code | |||
| | |||
|- | |- | ||
| | | codec | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | collection | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | collusion | ||
| Noun | |||
| | |||
| collision | |||
| | |||
|- | |- | ||
| | | collusion attack | ||
| Noun | |||
| | |||
| attaque en collusion | |||
| | |||
|- | |- | ||
| | | color | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | column | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | command | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | command and control server | ||
| Noun | |||
| A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: C&C, C2.Source EFF. | |||
| serveur de commandement | |||
| Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. | |||
|- | |- | ||
| | | command line | ||
| Noun | |||
| [CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations. Source EFF. | |||
| ligne de commande | |||
| | |||
|- | |- | ||
| | | command-and-control server | ||
| Noun | |||
| A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: C&C, C2.Source EFF. | |||
| serveur de commandement | |||
| Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. | |||
|- | |- | ||
| | | comment | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | commercial VPN | ||
| Noun | |||
| A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, untrusted local ISPs, or anyone else spying on your local network. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The downside is that the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to spy on your traffic.Source EFF. | |||
| RPV commercial | |||
| Un réseau privé virtuel commercial est un service privé qui offre de relayer par son propre réseau, en toute sécurité, vos communications Internet. L’avantage est que toutes les données que vous envoyez ou recevez sont dissimulées aux yeux des réseaux locaux. Cela assure à vos données une meilleure sécurité contre les criminels du voisinage, les FAI locaux non fiables ou quiconque pourrait espionner votre réseau local. Un RPV peut être hébergé dans un pays étranger, ce qui est utile à la fois pour protéger les communications contre un gouvernement local et pour contourner la censure nationale. L’inconvénient est que le trafic est déchiffré du côté du RPV commercial. Cela signifie que vous devez faire confiance au RPV commercial (et au pays où il se situe) pour qu’ils ne surveillent pas votre trafic.Source FFÉ. | |||
|- | |- | ||
| | | communicate | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | communication | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | community | ||
| Noun | |||
| | |||
| communauté | |||
| | |||
|- | |- | ||
| | | community center | ||
| Noun | |||
| | |||
| centre communautaire | |||
| | |||
|- | |- | ||
| | | companies | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | compartmentalization | ||
| Noun | |||
| | |||
| cloisonnement | |||
| | |||
|- | |- | ||
| | | compartmentalize | ||
| Verb | |||
| | |||
| cloisonner, compartimenter | |||
| | |||
|- | |- | ||
| | | compatible | ||
| Adjective | |||
| [Outline] | |||
| compatible | |||
| | |||
|- | |- | ||
| | | complete | ||
| Verb | |||
| | |||
| terminer | |||
| | |||
|- | |- | ||
| | | completed | ||
| Adjective | |||
| | |||
| terminé | |||
| | |||
|- | |- | ||
| | | component | ||
| Noun | |||
| | |||
| composant | |||
| | |||
|- | |- | ||
| | | compose | ||
| Verb | |||
| [Signal] | |||
| rédiger | |||
| | |||
|- | |- | ||
| | | compressed | ||
| Adjective | |||
| | |||
| comprimé | |||
| | |||
|- | |- | ||
| | | compression | ||
| Noun | |||
| | |||
| compression | |||
| | |||
|- | |- | ||
| | | compression/decompression tool | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | compromise | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | compromised | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | computer | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | concordance | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | conference | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | confidentiality | ||
| Adjective | |||
| [Globaleaks] [Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | configuration | ||
| Noun | |||
| [Globaleaks] [Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | configure | ||
| Verb | |||
| [Signal, Outline, Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | confirm | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | connect | ||
| Verb | |||
| [Signal, Outline] | |||
| | |||
| | |||
|- | |- | ||
| | | connecting | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | connection | ||
| Noun | |||
| [Orbot, Outline] | |||
| connexion | |||
| | |||
|- | |- | ||
| | | connectivity | ||
| Noun | |||
| [Orbot, Outline] | |||
| | |||
| | |||
|- | |- | ||
| | | consensus | ||
| Noun | |||
| [Tor] In Tor terms, a single document compiled and voted on by the directory authorities once per hour, ensuring that all clients have the same information about the relays that make up the Tor network. (Source: Tor Glossary) | |||
| consensus | |||
| | |||
|- | |- | ||
| | | constraint | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | contact | ||
| Noun | |||
| [Signal] [Martus] Another Martus user with whom you can share your Martus bulletins. | |||
| contact | |||
| | |||
|- | |- | ||
| | | contact | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | contact info | ||
| Noun | |||
| | |||
| renseignements de contact | |||
| | |||
|- | |- | ||
| | | contact information | ||
| Noun | |||
| | |||
| coordonnées | |||
| | |||
|- | |- | ||
| | | contact request | ||
| Noun | |||
| | |||
| demande de contact | |||
| | |||
|- | |- | ||
| | | container | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | content | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | context | ||
| Noun | |||
| [Globaleaks] Tips are classifies in contexts, e.g. corruption | |||
| Contexte | |||
| | |||
|- | |- | ||
| | | contributors | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | control panel | ||
| Noun | |||
| | |||
| panneau de configuration | |||
| | |||
|- | |- | ||
| | | control port | ||
| Noun | |||
| | |||
| port de contrôle | |||
| | |||
|- | |- | ||
| | | conventional | ||
| Adjective | |||
| | |||
| classique, traditionnel, conventionnel (rarement) | |||
| | |||
|- | |- | ||
| | | conversation | ||
| Noun | |||
| A "conversation" is the same as a message "thread" [Signal] | |||
| conversation | |||
| | |||
|- | |- | ||
| | | cookie | ||
| Noun | |||
| [Tor, CGIProxy, Orbot] Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in. (Source : EFF) | |||
| témoin | |||
| Les témoins sont une technologie Web qui permet aux sites Web de reconnaître votre navigateur. Les témoins étaient à l’origine conçus pour permettre aux sites de vous offrir des paniers d’achats, d’enregistrer vos préférences ou d’assurer votre connexion à un site. Ils permettent aussi le suivi à la trace et le profilage afin que les sites puissent vous reconnaître et en apprendre davantage sur votre navigation, les appareils que vous utilisez et ce qui vous intéresse, même si vous n’avez pas de compte sur ce site et n’y êtes pas connecté. (Synonyme : fichier témoin) (Source : FFÉ) | |||
|- | |- | ||
| | | copy | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | copyright notice | ||
| Noun | |||
| | |||
| avis de droit d’auteur | |||
| | |||
|- | |- | ||
| | | core Tor | ||
| Noun | |||
| [Tor] "Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues." (Source: Tor Glossary) | |||
| noyau Tor | |||
| | |||
|- | |- | ||
| | | corporate foundation | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | corporate intranet | ||
| Noun | |||
| Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.Source EFF. | |||
| Intranet d’entreprise | |||
| Les entreprises et autres sociétés d’envergure offriront habituellement certains services (par exemple courriel, Web, accès aux fichiers et aux imprimantes) accessibles de leur propre réseau local, mais pas de l’extérieur par Internet. La plupart des compagnies considèrent cette sécurité suffisante pour protéger leurs documents internes, mais cela signifie que n’importe quelle attaque qui peut se connecter à l’intranet peut aussi accéder ou interférer avec toutes les informations conservées localement. Un exemple d’une telle attaque serait d’amener un employé, par la ruse, à installer un programme malveillant sur son ordinateur portable. Afin de permettre aux employés de se connecter à l’intranet à partir d’Internet, les entreprises fourniront souvent leur propre réseau privé virtuel (RPV) qui crée une connexion sécurisée vers l’intranet accessible partout dans le monde.Source FFÉ. | |||
|- | |- | ||
| | | countries | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | country | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | country code | ||
| Noun | |||
| In a phone number | |||
| indicatif de pays | |||
| Dans un numéro de téléphone | |||
|- | |- | ||
| | | crash | ||
| Noun | |||
| | |||
| plantage | |||
| | |||
|- | |- | ||
| | | crash report | ||
| Noun | |||
| | |||
| rapport de plantage | |||
| | |||
|- | |- | ||
| | | create | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | credentials | ||
| Noun | |||
| [KeepassXC] | |||
| identifiant | |||
| Synonyme : authentifiant, renseignements, références | |||
|- | |- | ||
| | | credits | ||
| Noun | |||
| | |||
| crédits | |||
| | |||
|- | |- | ||
| | | critical | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cropping | ||
| Noun | |||
| | |||
| rognage | |||
| | |||
|- | |- | ||
| | | cross-certification | ||
| Noun | |||
| | |||
| certification croisée | |||
| | |||
|- | |- | ||
| | | cross-site scripting | ||
| Noun | |||
| [Tor] Cross-Site Scripting (XSS) allows an attacker to add malicious functionality or behavior to a website when they shouldn't have the ability to do so. (Source: Tor Glossary) | |||
| script intersites | |||
| | |||
|- | |- | ||
| | | crucial | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cryptocurrency | ||
| Noun | |||
| | |||
| cryptomonnaie | |||
| | |||
|- | |- | ||
| | | cryptographers | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cryptographic signature | ||
| Noun | |||
| [Tor] The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Synonyms: digital SignatureSource EFF. | |||
| signature cryptographique | |||
| Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer aussi qu’elle n’a pas été modifiée depuis qu’elle a été écrite. Les signatures numériques peuvent être utilisées avec les téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle publiée et que personne ne l’a manipulé frauduleusement. Elles sont aussi souvent utilisées pour le courriel chiffré et à de nombreuses autres fins. Si une information n’est pas protégée par une signature numérique, un fournisseur d’accès à Internet ou autre fournisseur de services de communication pourrait modifier le contenu de ce quelqu’un a écrit ou publié et il n’existerait aucun moyen technique de détecter ce qu’il s’est passé.Synonyme : signature numérique.Source FFÉ. | |||
|- | |- | ||
| | | cryptography | ||
| Noun | |||
| The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.Source EFF. | |||
| cryptographie | |||
| L’art de concevoir des codes secrets ou chiffres qui vous permettent d’envoyer ou de recevoir des messages à un destinataire sans que les autres puissent comprendre le message.Source FFÉ. | |||
|- | |- | ||
| | | cryptoparty | ||
| Noun | |||
| When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: key-signing party.Source EFF. | |||
| chiffrofête | |||
| Quand vous utilisez le chiffrement par clé publique, il est important de vous assurer que la clé que vous utilisez pour chiffrer un message appartient vraiment au destinataire (voir Vérification de clé). PGP facilite un peu ce processus en permettant de dire aux autres « Je croie que cette clé appartient à cette personne et si vous me faites confiance vous devriez le croire aussi ». Dire au monde entier que vous vous avez confiance en la clé de quelqu’un est appelé « Signer la clé de cette personne » : cela signifie que quiconque utilise cette clé peut voir que vous la cautionnez. Pour encourager les uns et les autres à vérifier et à signer leurs clés, les utilisateurs de PGP organisent des rencontres d’échange de signature de clés. Elles sont presque aussi palpitantes qu’elle semble l’être.Analogie : semblable à une rencontre de réseautage où vous présentez vos amis les uns aux autres.Synonymes : Échange de signature de clés.Source FFÉ. | |||
|- | |- | ||
| | | current | ||
| Adjective | |||
| | |||
| actuel | |||
| | |||
|- | |- | ||
| | | currently | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | curriculum for trainers | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | custidoan | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | custodian | ||
| Noun | |||
| [Globaleaks] | |||
| gardien | |||
| | |||
|- | |- | ||
| | | custom | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | customer support | ||
| Noun | |||
| | |||
| assistance à la clientèle | |||
| Synonyme : soutien à la clientèle | |||
|- | |- | ||
| | | customization | ||
| Noun | |||
| [Globaleaks] | |||
| personnalisation | |||
| | |||
|- | |- | ||
| | | customize | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | cut | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | daemon | ||
| Noun | |||
| [Tor] "A daemon is a computer program that runs as a background process, rather than being under the direct control of a user." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | darkweb | ||
| Noun | |||
| | |||
| Internet invisible | |||
| | |||
|- | |- | ||
| | | dashboard | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | data | ||
| Noun | |||
| [Signal, Outline, Orbot]N’importe quelle sorte d’informations, habituellement stockées sous forme numérique. Les données peuvent inclure des documents, des images, des clés, des programmes, des messages et autres informations numériques ou fichiers.Source: FFE. | |||
| données | |||
| Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files.Source : FFÉ | |||
|- | |- | ||
| | | data package | ||
| Noun | |||
| | |||
| paquet de données | |||
| | |||
|- | |- | ||
| | | data retention | ||
| Noun | |||
| | |||
| conservation des données | |||
| | |||
|- | |- | ||
| | | data storage | ||
| Noun | |||
| | |||
| magasin de données | |||
| | |||
|- | |- | ||
| | | data-Driven Dropdown (Field) | ||
| Noun | |||
| [Martus] | |||
| champ déroulant guidé par les données | |||
| | |||
|- | |- | ||
| | | database | ||
| Noun | |||
| [Signal, CGIProxy] | |||
| base de données | |||
| | |||
|- | |- | ||
| | | datastore | ||
| Noun | |||
| http://en.wikipedia.org/wiki/Datastore_network | |||
| magasin de données | |||
| | |||
|- | |- | ||
| | | date range | ||
| Noun | |||
| | |||
| plage de dates | |||
| | |||
|- | |- | ||
| | | day | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | deactivate | ||
| Verb | |||
| [Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | deanonymization | ||
| Noun | |||
| | |||
| désanonymisation | |||
| | |||
|- | |- | ||
| | | debit | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | debriefing | ||
| Noun | |||
| | |||
| réunion-bilan | |||
| | |||
|- | |- | ||
| | | debug | ||
| Verb | |||
| | |||
| déboguer | |||
| | |||
|- | |- | ||
| | | debug log | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | debug mode | ||
| Noun | |||
| | |||
| mode débogage | |||
| | |||
|- | |- | ||
| | | debugging | ||
| Noun | |||
| | |||
| débogage | |||
| | |||
|- | |- | ||
| | | decentralized | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | deck | ||
| Noun | |||
| [Ooniprobe] This is a collection of ooniprobe tests and inputs. | |||
| jeu de mesure | |||
| | |||
|- | |- | ||
| | | decline | ||
| Verb | |||
| [Signal] To reject. As in "Decline an incoming call." | |||
| refuser | |||
| | |||
|- | |- | ||
| | | declined | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | decompression | ||
| Noun | |||
| | |||
| décompression | |||
| | |||
|- | |- | ||
| | | decorating | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | decrypt | ||
| Verb | |||
| [Mailvelope] [Signal] [Orbot] Cryptography is the process of encryption and decryption of data. | |||
| déchiffrer | |||
| | |||
|- | |- | ||
| | | decrypted | ||
| Adjective | |||
| [Mailvelope] [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | decryption | ||
| Noun | |||
| [Mailvelope] [Orbot] | |||
| | |||
| | |||
|- | |- | ||
| | | dedicated server | ||
| Noun | |||
| [Globaleaks] | |||
| Serveur dédié | |||
| | |||
|- | |- | ||
| | | deductible | ||
| Adjective | |||
| | |||
| déductible | |||
| | |||
|- | |- | ||
| | | deepending | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | default | ||
| Adjective | |||
| [Globaleaks] [Signal] [Orbot] | |||
| par défaut | |||
| | |||
|- | |- | ||
| | | default | ||
| Noun | |||
| [Orbot] | |||
| valeur par défaut | |||
| Synonyme : par défaut. | |||
|- | |- | ||
| | | default server | ||
| Noun | |||
| | |||
| serveur par défaut | |||
| | |||
|- | |- | ||
| | | defenders | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | delay | ||
| Noun | |||
| | |||
| retard | |||
| Souvent « retard , car « délai » signifie temps laissé pour faire quelque chose ou sursit. | |||
|- | |- | ||
| | | delete | ||
| Verb | |||
| [Globaleaks] [Signal] | |||
| supprimer | |||
| | |||
|- | |- | ||
| | | deleted | ||
| Adjective | |||
| | |||
| supprimé | |||
| | |||
|- | |- | ||
| | | deletion | ||
| Noun | |||
| [Globaleaks] | |||
| | |||
| | |||
|- | |- | ||
| | | deprecated | ||
| Adjective | |||
| legacy' is something old still in use. 'deprecated' is something old that should not be used for now on. | |||
| déconseillé | |||
| Au sujet d’un programme ou fonction devenu obsolète et dont l’utilisation n’est plus recommandéeSynonyme : déprécié, désapprouvé. | |||
|- | |- | ||
| | | descriptor | ||
| Noun | |||
| Identification item for a file, a program or a data. | |||
| descripteur | |||
| Élément d’identification d’un fichier, d’un programme ou d’une donnée. | |||
|- | |- | ||
| | | deselect | ||
| Verb | |||
| | |||
| dessélectionner | |||
| La graphie désélectionner ne respecte pas strictement les règles de la grammaire française puisque le verbe en question est formé avec le préfixe dé- qui s'écrit des- devant un mot commençant par un s suivi d'une voyelle, comme les verbes dessécher, desserrer, desservir. | |||
|- | |- | ||
| | | desktop client | ||
| Noun | |||
| [Tor] | |||
| client pour ordinateur | |||
| | |||
|- | |- | ||
| | | desktop, desktop client | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | destroy | ||
| Verb | |||
| Removes message/file from the entire Peerio server and all users' accounts | |||
| détruire | |||
| | |||
|- | |- | ||
| | | detached signature | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | detail | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | detection | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | deter | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | device | ||
| Noun | |||
| [Signal] [Orbot] | |||
| appareil | |||
| Autres acceptions : périphérique, dispositif | |||
|- | |- | ||
| | | dialog | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | diceware | ||
| Noun | |||
| [KeePassXC] | |||
| méthode du lancer de dés | |||
| Méthode de sélection d’un mot de passe ou d’une phrase de passe qui consiste à lancer des dés et à en associer le résultat au mot correspondant dans une table préconstituée. | |||
|- | |- | ||
| | | digital | ||
| Adjective | |||
| | |||
| numérique | |||
| | |||
|- | |- | ||
| | | digital | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | digital certificate | ||
| Noun | |||
| A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.Synonyms: Security certificate.Source EFF. | |||
| certificat numérique | |||
| Une façon de confirmer automatiquement qu’une clé publique est correcte (qu’elle est vraiment celle utilisée par une entité précise) afin de prévenir les attaques de l’intercepteur. Il est le plus souvent utilisé par les sites Web pour prouver à votre navigateur que vous avez une connexion sécurisée vers un vrai site et non quelque système qui manipulerait frauduleusement votre connexion,Synonyme : certificat de sécurité.Source FFÉ. | |||
|- | |- | ||
| | | digital signature | ||
| Noun | |||
| [Mailvelope]The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official version, and that nobody has tampered with it. They're also often used to confirm encrypted email has not been altered. When information isn't protected by a digital signature, an attacker could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Source EFF. | |||
| signature numérique | |||
| Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer qu’elle n’a pas été modifiée après écriture. Les signatures numériques peuvent être utilisées avec des téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle et que personne ne l’a manipulé. Elles sont aussi souvent utilisées pour confirmer que les courriels chiffrés n’ont pas été altérés. Si une information n’est pas protégée par une signature numérique, un assaillant pourrait modifier le contenu de ce quelqu’un a écrit ou publié, et il n’existerait aucun moyen technique de le détecter.Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer aussi qu’elle n’a pas été modifiée depuis qu’elle a été écrite. Les signatures numériques peuvent être utilisées avec les téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle publiée et que personne ne l’a manipulé frauduleusement. Elles sont aussi souvent utilisées pour le courriel chiffré et à de nombreuses autres fins. Si une information n’est pas protégée par une signature numérique, un fournisseur d’accès à Internet ou autre fournisseur de services de communication pourrait modifier le contenu de ce quelqu’un a écrit ou publié et il n’existerait aucun moyen technique de détecter ce qu’il s’est passé.Source FFÉ. | |||
|- | |- | ||
| | | directory | ||
| Noun | |||
| [Signal] | |||
| répertoire ou annuaire | |||
| Attention : ne pas confondre les deux acceptions | |||
|- | |- | ||
| | | directory authorities | ||
| Noun | |||
| It's a bit like a phone book kept by some servers. More info at https://jordan-wright.com/blog/2014/12/19/what-happens-if-tor-directory-authorities-are-seized/ | |||
| autorités d’annuaire | |||
| | |||
|- | |- | ||
| | | directory authority | ||
| Noun | |||
| [Tor] "A special-purpose relay that maintains a list of currently-running relays and periodically publishes a consensus together with the other directory authorities." (Source: Tor Glossary) | |||
| | |||
| | |||
|- | |- | ||
| | | disable | ||
| Verb | |||
| [Signal] [Orbot] | |||
| désactiver | |||
| | |||
|- | |- | ||
| | | disabled | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | disabled | ||
| Adjective | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | disabled | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | disappearing message | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | discard | ||
| Verb | |||
| [Signal] | |||
| rejeter | |||
| | |||
|- | |- | ||
| | | disclaimer | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | disconnect | ||
| Verb | |||
| [Signal, Outline] | |||
| déconnecter | |||
| | |||
|- | |- | ||
| | | discouraged | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | discussion | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | disk | ||
| Noun | |||
| In most contexts in Martus, "disk" refers to any sort of removable storage device (USB, CD, floppy disk etc.) | |||
| | |||
| | |||
|- | |- | ||
| | | diversify | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | document | ||
| Noun | |||
| [Signal] | |||
| | |||
| | |||
|- | |- | ||
| | | domain | ||
| Noun | |||
| An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube. | |||
| domaine | |||
| | |||
|- | |- | ||
| | | domain name | ||
| Noun | |||
| The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF) | |||
| nom de domaine | |||
| L’adresse, sous forme de mots, d’un site Web ou d’un service Internet. Par exemple : ssd.eff.orgSource FFÉ. | |||
|- | |- | ||
| | | domain-fronting | ||
| Noun | |||
| | |||
| utilisation de domaine-écran | |||
| | |||
|- | |- | ||
| | | domestic violence survivors | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | domestic violence survivors | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | donating | ||
| | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | donating | ||
| Verb | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | donation | ||
| Noun | |||
| | |||
| don | |||
| | |||
|- | |- | ||
| | | donation process | ||
| Noun | |||
| | |||
| processus de don | |||
| | |||
|- | |- | ||
| | | donations | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | donor | ||
| Noun | |||
| | |||
| donateur | |||
| | |||
|- | |- | ||
| | | donor privacy policy | ||
| Noun | |||
| | |||
| Politique de confidentialité relative aux donateurs | |||
| | |||
|- | |- | ||
| | | download | ||
| Noun | |||
| [Globaleaks] | |||
| téléchargement | |||
| | |||
|- | |- | ||
| | | download | ||
| Verb | |||
| [Globaleaks] | |||
| télécharger | |||
| | |||
|- | |- | ||
| | | draft | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | drag | ||
| Verb | |||
| | |||
| glisser | |||
| | |||
|- | |- | ||
| | | drive | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | drop-down list | ||
| Noun | |||
| | |||
| liste déroulante | |||
| | |||
|- | |- | ||
| | | dual boot | ||
| Noun | |||
| | |||
| dual boot | |||
| | |||
|- | |- | ||
| | | ePub Reader | ||
| Noun | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | eQualitie | ||
| Noun | |||
| Do not translate | |||
| eQualitie | |||
| Ne pas traduire | |||
|- | |- | ||
| | | eavesdropper | ||
| Noun | |||
| | |||
| système d’écoute | |||
| | |||
|- | |- | ||
| | | edit | ||
| Verb | |||
| | |||
| modifier | |||
| | |||
|- | |- | ||
| | | eepsite | ||
| Noun | |||
| | |||
| site eep | |||
| | |||
|- | |- | ||
| | | eligibility criteria | ||
| Noun | |||
| | |||
| critères d'admissibilité | |||
| | |||
|- | |- | ||
| | | email | ||
| Noun | |||
| [Outline] | |||
| courriel | |||
| Parfois « adresse courriel » selon le contexte. | |||
|- | |- | ||
| | | email | ||
| Verb | |||
| | |||
| envoyer par courriel | |||
| | |||
|- | |- | ||
| | | email address | ||
| Noun | |||
| [Outline] | |||
| adresse courriel | |||
| | |||
|- | |- | ||
| | | email identity (e-mail identity) | ||
| Noun | |||
| Synonym: e-mail identity | |||
| identité de courriel | |||
| | |||
|- | |- | ||
| | | email list | ||
| Noun | |||
| | |||
| liste de diffusion | |||
| | |||
|- | |- | ||
| | | email provider | ||
| Noun | |||
| | |||
| service de courriel | |||
| | |||
|- | |- | ||
| | | email, e-mail | ||
| Noun | |||
| [Outline] Synonym: e-mail | |||
| courriel | |||
| | |||
|- | |- | ||
| | | embedded | ||
| Adjective | |||
| | |||
| intégré | |||
| | |||
| | |||
| | |||
|} | |} |
Latest revision as of 20:35, 28 June 2019
Terme | Type | Commentaire | Traduction fr | Commentaire fr |
---|---|---|---|---|
! | Conjunction | Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | ! | Précédé d’une espace fine |
" | Conjunction | Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | « » | «Espace insécable…Espace insécable» |
$ | Noun | Dollar | ||
%s | Conjunction | Do not translate or change. This is a placeholder (ex: 2%s or 1%s) | %s | Ne pas traduire ni modifier. C’est un emplacement réservé (p. ex. 2%S ou 1%s). |
Conjunction | &_nbsp_; [without underscores, Non-Breaking Space] | espace insécable HTML | ||
2-factor authentication | Noun | "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF) | authentification à deux facteurs | « Quelque chose que vous connaissez et quelque chose que vous avez ». Les systèmes d’authentification qui n’exigent qu’un nom d’utilisateur et son mot de passe risquent d’être percés si quelqu’un d’autre peut obtenir (ou deviner) ces informations. Les services qui offrent l’authentification à deux facteurs exigent aussi que vous fournissiez une confirmation séparée que vous êtes la personne que vous prétendez. La deuxième étape peut être un code secret à usage unique, un nombre généré par un programme qui fonctionne sur un appareil mobile ou un dispositif que vous portez, et qui peuvent être utilisés pour confirmer qui vous êtes. Des compagnies telles que les banques et les principaux services Internet comme Google, PayPal et Twitter offrent maintenant l’authentification à deux facteurs.Synonymes : A2F, validation en deux étapes, authentification multifacteur Source FFÉ. |
24/7 | Noun | Twenty-four hours, seven days a week. This essentially means "all the time" (non stop). Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running. | jour et nuit | |
2FA | Noun | Two-factor authenticationTwo-factor authentication"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: two-step verification, multi-factor authentication.Source EFF. | A2F | « Quelque chose que vous connaissez et quelque chose que vous avez ». Les systèmes d’authentification qui n’exigent qu’un nom d’utilisateur et son mot de passe risquent d’être percés si quelqu’un d’autre peut obtenir (ou deviner) ces informations. Les services qui offrent l’authentification à deux facteurs exigent aussi que vous fournissiez une confirmation séparée que vous êtes la personne que vous prétendez. La deuxième étape peut être un code secret à usage unique, un nombre généré par un programme qui fonctionne sur un appareil mobile ou un dispositif que vous portez, et qui peuvent être utilisés pour confirmer qui vous êtes. Des compagnies telles que les banques et les principaux services Internet comme Google, PayPal et Twitter offrent maintenant l’authentification à deux facteurs.Synonymes : A2F, validation en deux étapes, authentification multifacteurSource FFÉ. |
3D bar chart | Noun | [Martus] | graphique à barres en 3D | |
3rd party | Adjective | [Signal] As in “Use a 3rd party application.” | ||
: | Conjunction | Punctuation, not a conjunction, however “punctuation” is not an option in Transifex | : | Précédé d’une espace insécable |
; | Conjunction | Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | ; | Précédé d’une espace fine |
? | Conjunction | Punctuation, not a conjunction, however “punctionation” is not an option in Transifex | ? | Précédé d’une espace fine insécable ? |
A reasonably secure operating system | Noun | [Qubes OS] This is the Qubes OS tagline. | Un système d’exploitation relativement sûr | [Qubes OS] Ceci est la signature du SE Qubes OS. |
A security-oriented operating system | Noun | [Qubes OS] | Un système d’exploitation axé sur la sécurité | [Qubes OS] |
ADIDS | Noun | ADIDS is an approach to education and training. It is an acronym that stands for: Activity, Discussion, Input, Deepening and Synthesis | ||
API | Noun | Application Programming Interface: "In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software." - Wikipedia | interface de programmation | synonymes : interface de programmation, interface API, interface de programmation d’application, interface de programmation d’applications, interface de programme d'application. |
APK | Noun | "Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10." https://en.wikipedia.org/wiki/Android_application_package | APK | Paquet applicatif Android. |
ASCII | Noun | [KeePassXC] | ||
About | Preposition | [Globaleaks, Outline] As in, the “About” section of a website or application. | à propos | |
Alice | Noun | [Briar] | ||
American Apparel | Noun | [Tor Web] This is a brand name. Do not translate. | ||
Android | Noun | [Signal] [Orbot] Operating system | ||
Anti Evil Maid | Noun | [Qubes OS] Do not translate. Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. (Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html) | Anti Evil Maid | [Qubes OS] Ne pas traduire.« Anti Evil Maid » est la mise en œuvre d’un amorçage fixe fiable fondé sur TPM (module de plateforme fiable) dont le but premier est de prévenir les attaques de type « Evil Maid ».Source : https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html |
App Store | Noun | Apple App Store [Signal] | ||
AppVM | Noun | [Qubes OS] "Application Virtual Machine"A VM which is intended for running software applications. | MVappli | [Qubes OS] « Machine virtuelle applicative ». Une MV dont la tâche est d’exécuter des programmes d’application. |
Apt. | Noun | Apt. is short hand for "apartment." This will appear in a form requesting a user's address. | ||
Autocrypt Setup Message | Noun | [Mailvelope, Enigmail, OpenKeychain] | message de configuration Autocrypt | [Enigmail, OpenKeychain et autres clients de courriel] |
BCC | Noun | "Blind carbon copy" | Cci | Copie conforme invisible |
Back to | Adverb | |||
Benetech | Noun | Company name which should not be translated or transcribed. | Benetech | Nom de société que ne doit être ni traduit ni transcrit. |
BitTorrent | ||||
BitTorrent | Noun | |||
Bitcoin | ||||
Bitcoin | Noun | |||
Blow the Whistle | Noun | [Globaleaks] | ||
Blow the Whistle | Verb | [Globaleaks] GlobaLeaks catch phrase | lancer une alerte | |
Bob | Noun | [Briar] | ||
Bug | ||||
C&C | Noun | A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF. | serveur de commandement | Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. |
C2 | Noun | A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF. | serveur de commandement | Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. |
CAPTCHA | Noun | [Tor] CAPTCHA is always capitalized.Plural is CAPTCHAsIt means Completely Automated Public Turing Test To Tell Computers and Humans Apart. | captcha | L’acronyme signifie « Test de Turing public complètement automatisé » pour différencier les ordinateurs des utilisateurs humains (« Completely Automated Public Turing Test To Tell Computers and Humans Apart. »).L’acronyme est maintenant lexicalisé, considéré comme un nom commun et peut prendre la marque du pluriel au besoin. |
CFC program | Noun | |||
CGI | Noun | [CGIProxy] Shorthand for "Common Gateway Interface". "In computing, Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications (also called command-line interface programs) running on a server that generates web pages dynamically." Wikipedia: https://en.wikipedia.org/wiki/Common_Gateway_Interface#Purpose_of_the_CGI_standard | ||
CGIProxy | Noun | [CGIProxy] Project name. Do not translate or transcribe. | ||
CIDR | Noun | [TunnelBear] Classless inter-domain routing | routage interdomaine sans classes | Synonyme : CIDR |
CPU | Noun | UCT | Unité centrale de traitement | |
CSR | Noun | Certificate Signing Request | DSC | Demande de signature de certificat |
CSRF | Noun | |||
CVC | Noun | |||
Cancel | Verb | |||
Carol | Noun | [Briar] | ||
Certificate Signing Request | Noun | |||
ChatSecure | Noun | Application Name | ChatSecure | |
Chrome App | Noun | [Signal] | ||
Chrome OS | Noun | Chrome OS | ||
Chrome Web Store | Noun | |||
Circuit Display | Noun | [Tor] | Affichage des circuits | [Tor] |
Clear | Noun | |||
Clearnet | Noun | réseau visible | ||
Client User Interface | Noun | |||
ClockVM | Noun | MVhorloge | ||
Cobian Backup | Cobian Backup (software) | |||
Combined Federal Campaign | Noun | |||
Command-line tool | Noun | [CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations.Source EFF. | outil en ligne de commande | La « ligne de commande » est une façon de donner à un ordinateur une série de petits ordres autonomes. Pour utiliser un outil en ligne de commande, l’utilisateur tape une commande dans une fenêtre appelée émulateur de terminal, appuie sur la touche Retour ou Entrée et reçoit ensuite une réponse textuelle dans la même fenêtre. Les ordinateurs de bureau sous Windows, Linux et macOS peuvent encore exécuter des programmes en utilisant cette interface et, avec la bonne appli, même certains appareils mobiles peuvent le faire. La ligne de commande peut être utilisée pour exécuter des programmes livrés avec votre système d’exploitation. Certains programmes téléchargeables, particulièrement des utilitaires techniques, utilisent la ligne de commande au lieu d’une interface utilisateur plus familière composée d’icônes et de boutons. La ligne de commande exige que vous tapiez exactement la bonne suite de lettres et de chiffres pour obtenir le bon résultat, et il n’est parfois pas évident de savoir quoi faire si les réponses ne correspondent pas à vos attentes.Source FFÉ. |
Commit | Noun | archivage | Dans un système de contrôle de versions, transmettre, valider et classer, dans un espace de travail commun, les modifications, dûment identifiées, apportées à des fichiers par un utilisateur, afin d'en permettre l'accès aux autres utilisateurs du système. | |
Commit | Verb | archiver | Dans un système de contrôle de versions, transmettre, valider et classer, dans un espace de travail commun, les modifications, dûment identifiées, apportées à des fichiers par un utilisateur, afin d'en permettre l'accès aux autres utilisateurs du système. | |
Company | Noun | Entreprise | Autres acceptions :Société (entreprise constituée ou non en société de capitaux),Compagnie (société de production de spectacles de théâtre ou de danse). | |
Compass | Noun | [Tor] Compass is a web application to learn about currently running Tor relays in bulk. (Source: Tor Glossary) | ||
Computer Engine | Noun | [Outline] Compute Engine is a product of Google Cloud Platform and should not be translated. | ||
Core | Noun | noyau | Synonyme : cœur. | |
Courier | Noun | [Courier] App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (كوريور) | ||
Crowdfunding | Noun | financement participatif | ||
Crypto | Adjective | cryptographique | ||
Crypto | Noun | This is an abbreviation of “cryptography.” | cryptographie | |
Customization Template Files (*.mct) | Noun | [Martus] | fichier de modèle de personnalisation (*.mct) | |
DD | Noun | |||
DDoS | Noun | A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.Synonyms: distributed denial of serviceSource EFF | attaque par saturation | Une méthode pour mettre hors service un site Web ou autre service Internet en coordonnant de nombreux ordinateurs différents afin qu’ils lui demandent ou lui envoient simultanément des données. Habituellement, les ordinateurs utilisés pour mener une telle attaque sont contrôlés à distance par des criminels qui ont pris le contrôle des machines en les piratant ou en les infectant par un programme malveillant.Synonymes : attaque par déni de service, attaque par déni de service distribué, attaque par DDOS.Source FFÉ. |
DDoS (distributed denial of service) | Noun | A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF) | attaque par saturation | Une méthode pour mettre hors service un site Web ou autre service Internet en coordonnant de nombreux ordinateurs différents afin qu’ils lui demandent ou lui envoient simultanément des données. Habituellement, les ordinateurs utilisés pour mener une telle attaque sont contrôlés à distance par des criminels qui ont pris le contrôle des machines en les piratant ou en les infectant par un programme malveillant.Synonyme : attaque par déni de service, attaque par déni de service distribué, attaque par DDOS.Source FFÉ. |
DHT | Noun | table de hachage distribuée | ||
DNS | Noun | [TunnelBear] Domain Name Server | DNS | |
DNS record | Noun | |||
DVM | Noun | [Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates. | MVJ | |
DVM Template | Noun | [Qubes] TemplateBasedVMs on which DispVMs are based. | modèle de MVJ | |
Darknet | Noun | réseau invisible | ||
Data Collection Policy | Noun | [Outline] | ||
Data Retention Strategy | Noun | stratégie de conservation des données | ||
Data Source Grid | Noun | grille de sources de données | ||
Data-Driven Dropdown (Field) | Noun | [Matus] | ||
Date | Noun | |||
Debian-based Linux | Noun | [Signal] | ||
Deflect | Noun | Don't translate this | ||
Device Management | Noun | gestion des appareils | Autre acception : gestion des périphériques, des dispositifs | |
Devtools | Noun | |||
DigitalOcean | Noun | [Outline] Project name. Please do not translate or transcribe. | ||
DispVM | Noun | [QubesOS] "Disposable Virtual Machine"A temporary AppVM based on a DVM Template which can quickly be created, used, and destroyed. | MVjet | |
Distributed | Verb | distribué | ||
Distribution | Noun | As in "Linux distribution" | version | On parlera d’une version de Linux, non d’une distribution. |
Divice Management | Noun | |||
Dom0 | Noun | [QubesOS] "Domain Zero" Also known as the **host** domain, dom0 is the initial VM started by the Xen hypervisor on boot. | Dom0 | |
DomU | Noun | [QubesOS] "Unprivileged Domain"Also known as **guest** domains, domUs are the counterparts to dom0. | DomU | |
Donate | faire un don | |||
Donate Page | page de don | |||
Double-check | Verb | [Signal] | ||
Drag and Drop | Noun | glisser-coller | ||
Drawer | Noun | A UI design pattern that consist on a lateral, hidden menu that can be brought into view usually by tapping an "hamburguer" icon or swiping from the left. | ||
DuckDuckGo | Noun | Name of an open source search engine. | DuckDuckGo | Nom d’un moteur de recherche à code source ouvert. |
Dump | Noun | vidage | ||
Dump | Verb | vider | ||
EC2 | Noun | [Outline] "Amazon Elastic Compute Cloud" Wikipedia: https://en.wikipedia.org/wiki/Amazon_Elastic_Compute_Cloud | ||
EPUB Reader | Noun | liseuse EPUB | ||
Eavesdropping | Noun | écoute électronique | ||
Edge | Noun | extrémité | ||
Edge server | Noun | serveur d’extrémité | ||
Email Subject | Noun | [Globaleaks] | objet d’un courriel | |
Encrypted | Verb | [Globaleaks] | chiffré | |
Ensure | Verb | garantir | ||
Enter | ||||
Event | Noun | événement | ||
External drive | Noun | lecteur externe | ||
Extra text | Noun | |||
FAI satellite | Noun | |||
FAQ | Noun | [Orbot] “Frequently Asked Questions” | FAQ | Synonymes : questions fréquemment posées, questions fréquentes |
FOSS | Noun | Free and open-source software | ||
FTP (File Transfer Protocol) | Noun | [CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.Synonyms: FTP server, File Transfer Protocol. (Source: EFF) | protocole de transfert de fichiers | Une ancienne méthode pour copier les fichiers d’un ordinateur local vers un ordinateur distant ou vice-versa. Le travail des programmes FTP (et des serveurs FTP qui stockent les fichiers) a essentiellement été remplacé par les navigateurs et les serveurs Web, ou encore par des programmes de synchronisation des fichiers comme Dropbox.Synonyme : serveur FTP, FTP, protocole FTP.Source FFÉ. |
FTP data socket | Noun | [CGIProxy] | ||
FTP server | Noun | [CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer Protocol) (Source EFF) | serveur FTP | Une ancienne méthode pour copier les fichiers d’un ordinateur local vers un ordinateur distant ou vice-versa. Le travail des programmes FTP (et des serveurs FTP qui stockent les fichiers) a essentiellement été remplacé par les navigateurs et les serveurs Web, ou encore par des programmes de synchronisation des fichiers comme Dropbox.Synonyme : Protocole de transfert de fichiers, FTP, protocole FTP.Source FFÉ. |
Face ID | Noun | [Signal] Specific to iOS | ||
Fallback | Adjective | [Globaleaks] | ||
Fallback | Noun | [Orbot] [Globaleaks] | Repli | |
Favicon | Noun | A favicon, also known as a shortcut icon, website icon, tab icon, URL icon, or bookmark icon, is a file containing one or more small icons, associated with a particular website or web page. | ||
File hash value | Noun | A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.Synonyms: File fingerprint.Source EFF. | empreinte de fichier | Une séquence de lettres et de chiffres qui représente le contenu d’un fichier. Changer un fichier un tant soit peu modifiera complètement son empreinte. La vérification de l’empreinte d’un fichier que vous avez téléchargé, que ce soit un logiciel ou un greffon, contribue à garantir que vous avez obtenu le même fichier qu’autrui et que personne ne l’a altéré lors de son téléchargement.Synonyme : empreinte numérique, condensé numérique, condensat.Source FFÉ. |
File system | Noun | Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.Source EFF. | système de fichiers | Là où vos données sont enregistrées, habituellement localement sur votre ordinateur ou sur un autre appareil. Les documents personnels et les notes sont généralement enregistrés sur des systèmes de fichiers afin d’y accéder facilement.Source FFÉ. |
Firefox | Noun | |||
FirewallVM | Noun | [Qubes] "Firewall Virtual Machine"A type of ProxyVM which is used to enforce network-level policies (a.k.a. "firewall rules"). | MVpare-feu | |
Firewalled | Adjective | derrière un pare-feu | pare-feu est invariable | |
Firmware | Noun | micrologiciel | ||
Fit | ||||
Form | Noun | formulaire | ||
Form 990 | ||||
Forward Secrecy | Noun | A property of a secure messaging system which ensures that your past communications can remain secure even if one of the secret keys is stolen later. Forward secrecy works by using the participant’s secret keys to generate a new key, which is only used for the current conversation and destroyed afterwards, rendering old messages impossible to decrypt. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.Synonyms: Perfect forward secrecy.Source: EFF. | confidentialité persistante | Une propriété d’un système sécurisé de messagerie qui garantit la sécurité de vos communications passées même si l’une des clés privées est volée ultérieurement. La confidentialité persistante fonctionne en utilisant les clés secrètes du participant pour générer une nouvelle clé qui n’est utilisée que pour la conversation en cours et qui est détruite par la suite, ce qui rend les anciens messages impossibles à déchiffrer. Pour les sites HTTPS, la confidentialité persistante est une protection importante contre des adversaires, tels que les agences de renseignement, qui pourraient enregistrer de grandes portions du trafic et utiliser une clé volée pour les déchiffrer. Pour les messageries instantanées et les systèmes de dialogue en ligne, la confidentialité persistante est nécessaire afin de garantir que les messages supprimés sont bel et bien supprimés. Vous devrez toutefois aussi soit désactiver la journalisation soit supprimer les anciens messages de façon sécuritaire.Source : FFÉ. |
Frequently Asked Questions | Noun | “FAQ” | foire aux questions | |
Fully Qualified Domain Name | Noun | See https://en.wikipedia.org/wiki/Fully_qualified_domain_name | ||
Functionality | Noun | fonction | Rarement fonctionnalité, qui est le caractère de ce qui estfonctionnel, de ce qui répond à une fonction déterminée, ou encorepossibilité de traitement offerte par un système informatique, unlogiciel ou un site Web, par exemple des fonctionnalitésd’administration.Synonyme : option.Attention : Fonctionnalité n’est pas toujours interchangeable avec fonction ouoption. | |
GB | Noun | |||
GC | Noun | Garbage collector | nettoyeur de mémoire | |
GDPR | Noun | Synonym: GDPRhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en | RGPD | Synonyme : RGPDhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_fr |
GFW | Noun | grand pare-feu chinois | ||
GIF | Noun | Graphics Interchange Format [Signal] | ||
GNU General Public License | Noun | licence publique générale GNU | ||
GPG | Noun | "Gnu Privacy Guard" GPG is a free software that implements OpenPGP specification | ||
Garbage data | Noun | données parasites | ||
Garlic | Noun | https://en.wikipedia.org/wiki/Garlic_routing | ail | |
Garlic routing | Noun | https://en.wikipedia.org/wiki/Garlic_routing | routage en ail | |
General Data Protection Regulation | Noun | Synonym: GDPRhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en | règlement général sur la protection des données | Synonyme : RGPDhttps://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_fr |
Get | ||||
Get Access Mode | Noun | [Lantern] | mode obtenir l'accès | [Lantern] |
GetTor | Noun | [Orbot, Tor] "It is a service that automatically responds to messages (Email, XMPP, Twitter) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub." (Source: Tor Glossary) | GetTor | |
Getting Started | Noun | premiers pas | ||
Ghost | Noun | [Peerio] "Ghost" is used as a proper noun in Peerio for a feature that allows users to send messages and files to a non-Peerio user via email or URL. This URL can be accessed with a secret passphrase and decrypted in the browser."I sent you a (Peerio) Ghost" | Ghost | [Peerio] Traduire par « Ghost (fantôme).Dans Peerio, Ghost est le nom d’une fonction qui permet aux utilisateurs d’envoyer des messages et des fichiers par courriel ou URL à d’autres utilisateurs qui n’utilisent pas Peerio. On peut accéder à cette URL par une phrase de passe secrète et le message est déchiffré dans le navigateur. « Je vous ai envoyé un Ghost (fantôme) Peerio ». |
Giant Rabbit | This is the web agency doing for example the donate page of the Tor Project | |||
Give Access Mode | Noun | [Lantern] | mode donner l'accès | [Lantern] |
GlobaLeaks | Noun | [Globaleaks] Name of application. Do not translate. | ||
Glossary | Noun | |||
Go Back | Verb | |||
Verb | Company Name (Reference Google.com for appropriate transcription if applicable) | rechercher sur Google | ||
Google CAPTCHA | Noun | CAPTCHA is always capitalized.Plural is CAPTCHAsIt means Completely Automated Public Turing Test To Tell Computers and Humans Apart. | captcha Google | L’acronyme signifie « Test de Turing public complètement automatisé » pour différencier les ordinateurs des utilisateurs humains (« Completely Automated Public Turing Test To Tell Computers and Humans Apart. »).L’acronyme est maintenant lexicalisé, considéré comme un nom commun et peut prendre la marque du pluriel au besoin. |
Google Chrome | Noun | Chrome de Google | ||
Google Drive | Noun | disque Google Drive | ||
Google Play Store | Noun | [Signal] | logithèque Google Play Store | |
Got Skills | ||||
Graceful Shutdown | Noun | [I2P] | fermeture respectueuse | [I2P] |
Gracefully | Adverb | respectueusement | ||
Graph | Noun | graphique | ||
Graph | Verb | graphiquer | ||
Great Firewall of China | Noun | grand pare-feu chinois | ||
Grid | Noun | Grille | ||
Guardian Project | Noun | Projet Guardian | Chaque mot commence par une majuscule | |
HQ | Noun | siège social | ||
HRD | Noun | Human Rights Defence | DDP | Défense des droits de la personne |
HTTP | Noun | [KeepassXC, CGIProxy, Orbot, Tor] "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web." - Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol) | ||
HTTP Header Field Manipulation | Noun | HTTP Manipulation du champ d'en-tête | ||
HTTP Invalid Request Line | Noun | HTTP Ligne de requête invalide | ||
HTTPS | Noun | [Tor] "HTTPS (also called HTTP over Transport Layer Security [TLS], HTTP over SSL, and HTTP Secure) is a communications protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data." - Wikipedia (https://en.wikipedia.org/wiki/HTTPS) | HTTPS | Si vous avez déjà vu une adresse Web épelée « http://www.exemple.com/ », vous reconnaissez la partie « http » de cette adresse. Le HTTP (protocole de transfert hypertexte) est le moyen qu’un navigateur Web sur votre machine utilise pour parler à un serveur Web distant. Malheureusement, le HTTP normal envoie du texte par Internet sans sécurité. Le HTTPS (S signifiant sécurisé) utilise le chiffrement pour mieux mettre à l’abri des regards indiscrets les données que vous envoyez aux sites Web ainsi que les informations qu’ils vous retournent.Source FFÉ. |
HTTPS Everywhere | Noun | [Tor] "HTTPS Everywhere is a Firefox, Chrome, and Opera extension that makes HTTPS the default on websites that have set up HTTPS but have not made it the default. HTTPS Everywhere is installed in Tor Browser." (Source: Tor Glossary) | HTTPS partout | |
HTTPS certificate | Noun | [Tor] | certificat HTTPS | |
HVM | Noun | [Qubes] "Hardware Virtual Machine"Any fully virtualized, or hardware-assisted, VM utilizing the virtualization extensions of the host CPU. | MVM | Pour "Machine Virtuelle Matérielle" |
Hardcoded | Verb | figé dans le code | ||
Hardware | Noun | |||
Headline | Noun | |||
Heart of Internet Freedom | Noun | |||
Heartbeat | Noun | |||
Help | Noun | [Orbot, Outline] Menu option. | ||
Hypertext Transfer Protocol | Noun | protocole de transfert hypertexte | ||
I/O | Noun | Input/ouput | E/S | Entrée/sortie |
I2P | Noun | [I2P] Name of application. Do not translate. | ||
ID | Noun | [Mailvelope] | ID | identifiant pour les produits Apple |
IDE | Noun | environnement de développement intégré | ||
IMAP settings | Noun | IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.Source EFF. | paramètres IMAP | IMAP est le protocole utilisé par de nombreux programmes de courriel pour communiquer avec les services qui envoient, reçoivent et stockent vos courriels. En changeant les paramètres IMAP de votre programme de courriel, vous pouvez choisir de charger vos courriels à partir de serveurs différents et de définir le niveau de sécurité et de chiffrement utilisé pour transférer les courriels d’Internet vers vous.Source EFF. |
IP address | Noun | [Orbot, Outline, CGIProxy, Tor] A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. (Source EFF) | adresse IP | Sur Internet, un appareil doit avoir sa propre adresse pour recevoir des données, comme une résidence ou une société doivent avoir une adresse civique pour recevoir du courriel physique. Cette adresse est son adresse IP (protocole Internet). Quand vous vous connectez à un site Web ou autre serveur en ligne, vous révélez habituellement votre propre adresse IP. Cela ne révèle pas forcément votre identité (il est difficile d’associer une adresse IP à une vraie adresse ou à un ordinateur particulier). Une adresse IP peut cependant révéler des informations sur vous, telles que votre position géographique approximative ou le nom de votre fournisseur d’accès à Internet. Des services comme Tor vous permettent de dissimuler votre adresse IP, ce qui contribue à préserver votre anonymat en ligne.Source FFÉ. |
IP address spoofing | Noun | usurpation d’adresse IP | ||
IRS | Noun | US Internal Revenu Service | agence du revenu des États-Unis | |
ISAC | Noun | [Deflect]Information Sharing and Analysis Center | CPAI | [Deflect]Centre de partage et d’analyse de l’information |
ISP | Noun | [Tor] Internet Service Provider "An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting." (Source: Tor Glossary) | FAI | Fournisseur d’accès à Internet |
Immediate | Adjective | |||
Implement | Verb | mettre en œuvre | Réaliser l’ultime finale d’élaboration d’un système informatique pour le rendre fonctionnel.Synonyme : implémenter | |
Inbound | Adjective | entrant | ||
Include Private Data | Verb | |||
Indicators of compromise | Noun | Clues that show that your device may have been broken into or tampered with.Source EFF. | indicateurs de compromission | Indices qui démontrent que votre appareil pourrait avoir été piraté ou modifié frauduleusement.Source FFÉ. |
Intermediate Certificate | Noun | |||
Internal storage | Noun | Non volatile memory used in devices, mobile or else. | mémoire interne | La mémoire à long terme (mémoire non volatile) permet de conserver les données, par exemple sur un appareil mobile.Ne pas confondre avec le stockage qui est l’action de conservation des données dans une mémoire. |
Internet censorship | Noun | censure d’Internet | ||
Internet filtering, content filtering | Noun | [Orbot] Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Network or services like Tor are sometimes used to access Internet communciations that would otherwise be filtered.(Source: EFF) | filtrage d’Internet | Filtrage est un terme poli pour regrouper les notions de blocage et de censure du trafic Internet. Les réseaux privés virtuels ou les services tels que Tor sont parfois utilisés pour accéder à des communications Internet qui seraient filtrées autrement.Filtrage est un terme plus poli pour regrouper les notions de blocage et de censure du trafic Internet.Synonyme : blocage.Source : FFÉ. |
Introduce | Verb | |||
Introducer | Noun | proposeur | ||
Introduction | Noun | présentation | ||
Item | Noun | élément | Synonyme : article | |
JRE | Noun | Synonym: Java Runtime Environment | moteur d’exécution Java | |
JS | Noun | |||
Java Runtime Environment | Noun | Synonyme : JRE | moteur d’exécution Java | |
JavaScript | Noun | [Tor] "JavaScript is a programming language that websites use to offer interactive elements such as video, animation, audio, and status timelines. Unfortunately, JavaScript can also enable attacks on the security of the web browser, which might lead to deanonymization. The NoScript extension in Tor Browser can be used to manage JavaScript on different websites." (Source: Tor Project) | ||
Join | Verb | se joindre | ||
KB | Noun | [Orbot] kilobyte | ||
KB/s | Noun | kb/s | kilobit par seconde | |
KB/s, Kbps | Noun | |||
KBps | Noun | kb/s | kilobit par seconde | |
Kbps, KB/s | Noun | [Orbot] kilobytes per second | ||
Key-signing party | Noun | When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: cryptoparty.Source EFF. | Échange de signature de clés | Quand vous utilisez le chiffrement par clé publique, il est important de vous assurer que la clé que vous utilisez pour chiffrer un message appartient vraiment au destinataire (voir Vérification de clé). PGP facilite un peu ce processus en permettant de dire aux autres « Je croie que cette clé appartient à cette personne et si vous me faites confiance vous devriez le croire aussi ». Dire au monde entier que vous vous avez confiance en la clé de quelqu’un est appelé « Signer la clé de cette personne » : cela signifie que quiconque utilise cette clé peut voir que vous la cautionnez. Pour encourager les uns et les autres à vérifier et à signer leurs clés, les utilisateurs de PGP organisent des rencontres d’échange de signature de clés. Elles sont presque aussi palpitantes qu’elle semble l’être.Analogie : semblable à une rencontre de réseautage où vous présentez vos amis les uns aux autres.Synonymes : chiffrofête.Source FFÉ. |
Keyboard | Noun | [Signal] | clavier | |
LGBTQ+ | Noun | "LGBTQ+" stands for "Lesbian, Gay, Bisexual, Transgender, Queer or Questioning and more"https://ok2bme.ca/resources/kids-teens/what-does-lgbtq-mean/ | ||
Language pack | Noun | paquet de langue | ||
Lantern | Noun | [Lantern] Application Name (https://getlantern.org) | ||
Lantern Cloud Server | Noun | [Lantern] “Lantern” is the name of an application. (https://getlantern.org) | Serveur nuagique Lantern | [Lantern] |
Last Name | ||||
Launcher | Noun | [Tor] | lanceur | |
Leak | Noun | Synonym: data leakage | fuite | Synonyme : fuite de données |
Lease | Noun | bail | ||
Leaseset | Noun | jeu de baux | ||
Let's Encrypt | Noun | Don't translate this. For more info see https://en.wikipedia.org/wiki/Let%27s_Encrypt | ||
License Agreement | Noun | [Globaleaks] | ||
Linked Identity | Noun | identité reliée | ||
List | Noun | |||
Listen | Verb | |||
Live CD | Noun | CD autonome | ||
Live ISO | Noun | ISO autonome | ||
Live OS | Noun | SE autonome | ||
Live System | Noun | système autonome | ||
Live USB | Noun | USB autonome | ||
Localization Lab | Noun | Labo de localisation | ||
Login page | Noun | page de connexion | ||
MAC address spoofing | Noun | [Tails] usurpation d’adresse MAC | ||
MB | Noun | [Orbot] megabyte | ||
MBR | Noun | |||
MIME | Noun | [Signal, CGIProxy] | ||
MISP (Malware Information Sharing Platform) | Noun | [SES] "The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information." -http://www.misp-project.org/ | ||
MITM (Man-in-the-middle attack) | Noun | Suppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: Man-in-the-middle attack.Source EFF. | attaque de l’intercepteur | Supposons que vous croyez que vous échangez avec votre ami Mark grâce à une messagerie instantanée chiffrée. Pour vous assurer que c’est bien lui, vous lui demandez de vous indiquer dans quelle ville vous vous êtes connus. Sa réponse est « Johannesburg ». C’est juste ! Malheureusement, sans que Mark ni vous ne le sachiez, quelqu’un d’autre, en ligne, a intercepté toutes vos communications. Lors de votre première connexion à Mark, vous vous êtes en fait connecté à cette personne qui s’est à son tour connectée à Mark. Quand vous pensez que vous posez une question à Mark, cette personne reçoit votre message, relaie la question à Mark, reçoit sa réponse et vous l’envoie ensuite. Alors que vous pensez communiquer en toute sécurité avec Mark, vous êtes en fait en train de communiquer en toute sécurité avec l’espion qui communique aussi en toute sécurité avec Mark ! C’est une attaque de l’intercepteur. L’intercepteur peut espionner vos communications et même insérer des messages faux ou trompeurs dans vos communications. Les logiciels de communication par Internet axés sur la sécurité doivent se défendre contre l’attaque de l’intercepteur pour être à l’abri d’attaquants qui contrôlent quelque portion d’Internet entre deux personnes qui communiquent.Synonyme : attaque de l’intercepteur, attaque par hôte interposé.Source FFÉ. |
MM | Noun | |||
MMS | Noun | “Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service [Signal] | ||
MMSC | Noun | Multimedia Messaging Service Center. A mobile network operator's store and forward server for relaying MMS (Multimedia Messaging Service) messages. [Signal] | ||
Magic Word | Noun | mot magique | ||
Mailvelope | Mailvelope | |||
Maintainer | Noun | mainteneur | ||
Malformed | Adjective | mal formé | ||
Malicious | Adjective | malveillant | ||
Malicious software | Noun | Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malware.Source EFF. | programme malveillant | Un programme conçu pour effectuer des actions non désirées sur votre appareil. Les virus informatiques sont des programmes malveillants. Il en est de même pour les programmes qui volent vos mots de passe, vous enregistrent en secret ou suppriment vos données.Synonymes : logiciel malveillant, maliciel.Source FFÉ. |
Malware | Noun | Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malicious softwareSource EFF. | programme malveillant | Un programme conçu pour effectuer des actions non désirées sur votre appareil. Les virus informatiques sont des programmes malveillants. Il en est de même pour les programmes qui volent vos mots de passe, vous enregistrent en secret ou suppriment vos données.Synonymes : logiciel malveillant, malicielSource FFÉ. |
Man-in-the-middle attack (MITM) | Noun | Suppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: MITMSource EFF. | attaque de l’intercepteur | Supposons que vous croyez que vous échangez avec votre ami Mark grâce à une messagerie instantanée chiffrée. Pour vous assurer que c’est bien lui, vous lui demandez de vous indiquer dans quelle ville vous vous êtes connus. Sa réponse est « Johannesburg ». C’est juste ! Malheureusement, sans que Mark ni vous ne le sachiez, quelqu’un d’autre, en ligne, a intercepté toutes vos communications. Lors de votre première connexion à Mark, vous vous êtes en fait connecté à cette personne qui s’est à son tour connectée à Mark. Quand vous pensez que vous posez une question à Mark, cette personne reçoit votre message, relaie la question à Mark, reçoit sa réponse et vous l’envoie ensuite. Alors que vous pensez communiquer en toute sécurité avec Mark, vous êtes en fait en train de communiquer en toute sécurité avec l’espion qui communique aussi en toute sécurité avec Mark ! C’est une attaque de l’intercepteur. L’intercepteur peut espionner vos communications et même insérer des messages faux ou trompeurs dans vos communications. Les logiciels de communication par Internet axés sur la sécurité doivent se défendre contre l’attaque de l’intercepteur pour être à l’abri d’attaquants qui contrôlent quelque portion d’Internet entre deux personnes qui communiquent.Synonyme : attaque par hôte interposé.Source FFÉ. |
Manage Contacts | Noun | [Martus] Martus menu option. | ||
Martus Desktop | Noun | [Martus] | Martus pour ordinateur | [Martus] |
Martus Desktop Application | Noun | [Martus] | application Martus pour ordinateur | [Martus] |
Martus Information Management and Data Collection Framework | Noun | [Martus] | cadre applicatif Martus de gestion des informations et de collecte des données | [Martus] |
Martus Record Archive (*mba) | Noun | [Martus] | archive de bulletins Martus (*mba) | [Martus] |
Martus Report Format (.mrf) | Noun | [Martus] | format de rapport Martus | [Martus] |
Martus Search Specification | Noun | [Martus] | spécification de recherche Martus | [Martus] |
Master Boot Record, MBR | Noun | enregistrement d'amorçage maître | ||
Match | ||||
Matching | Adjective | [Globaleaks] | ||
Matching Conditions | ||||
Megabytes | Noun | [Globaleaks] | ||
Message Format | Noun | |||
Message Of The Day | Noun | |||
Mixnet | Noun | réseau de mélange | ||
Mobile Martus | Noun | [Martus] | Martus mobile | [Martus] |
Multihome | Noun | multiconnexions | ||
Multihoming | Noun | multiconnexions | ||
My Computer | Noun | The user’s home folder in some operating systems. | Poste de travail | Dossier personnel de l’utilisateur sous certains systèmes d’exploitation |
NAT | Noun | Network Address Translation | traduction d’adresses de réseau | |
NGO | Noun | Non-Governmental Organization | ||
NGOs | ||||
NSA | ||||
Name | Noun | |||
Naming service | Noun | service de noms | ||
Navigate to | Verb | |||
NetDB | Noun | network database | BDréseau | base de données de réseau |
NetVM | Noun | "Network Virtual Machine"A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM. | MVréseau | |
Next | ||||
Next | Noun | “Next” button | ||
No | Noun | |||
Non-Tor | Noun | non Tor | ||
OK | Noun | [Signal] “OK” button which can also be translated as “Accept” | Valider | |
OONI | Noun | [Tor, OONI Probe] "OONI stands for "Open Observatory of Network Interference", it is a global observation network for detecting censorship, surveillance and traffic manipulation on the internet." (Source: Tor Project) | ||
OPML | Noun | Outline Processor Markup Language"OPML (Outline Processor Markup Language) is an XML format for outlines (defined as "a tree, where each node contains a set of named attributes with string values"). Originally developed by UserLand as a native file format for the outliner application in its Radio UserLand product, it has since been adopted for other uses, the most common being to exchange lists of web feeds between web feed aggregators."- https://en.wikipedia.org/wiki/Opml | ||
OS | Noun | Operating system | SE | système d'exploitation |
OTR | Noun | Off The Record | protocole OTR | Souvent, les systèmes de messagerie instantanée ne sont pas chiffrés. Le protocole OTR est une façon d’y ajouter le chiffrement afin que vous continuiez à utiliser des réseaux familiers tels que les systèmes de clavardage de Facebook et Google ou encore Hangouts, tout en vous assurant que vos messages résistent mieux à la surveillance.Le protocole cryptographique OTR apporte un chiffrement robuste aux systèmes de messagerie instantanée,Synonyme : messagerie OTRSource FFÉ. |
Observatory | Noun | observatoire | ||
Off | Adjective | désactivé | Synonyme : éteint | |
Off-the-Record | Noun | [Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for messaging conversations. (Synonyms : OTR) (Source EFF) | protocole OTR | Souvent, les systèmes de messagerie instantanée ne sont pas chiffrés. Le protocole OTR est une façon d’y ajouter le chiffrement afin que vous continuiez à utiliser des réseaux familiers tels que les systèmes de clavardage de Facebook et Google ou encore Hangouts, tout en vous assurant que vos messages résistent mieux à la surveillance.Le protocole cryptographique OTR apporte un chiffrement robuste aux systèmes de messagerie instantanée,Synonyme : messagerie OTR.Source FFÉ. |
On | Preposition | |||
Onion | Noun | [Tor] | onion | [Tor] |
Onion Browser | Noun | [Tor] Project Name. Do not translate "Onion", however you can translate "Browser". Ex: Navegador Onion | Navigateur Onion | [Tor] Chaque mot commence par une majuscule. |
Onion Circuits | Noun | [Tor] | circuits onion | [Tor] |
Onion Services | Noun | |||
Online Abuse | Harcèlement en ligne | |||
Open Observatory of Network Interference | Noun | [OONI Probe, Tor] Acronym: OONI | observatoire ouvert des interférences réseau | |
Open Whisper Systems | Noun | Organization name. Do not translate. [Signal] | ||
OpenPGP | Noun | [Mailvelope]OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy) | ||
OpenPGP key | Noun | [Mailvelope] | clé OpenPGP | |
Operating System (OS) | Noun | [Signal, Tor] A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems. (Source: EFF)(Synonym: OS) | système d’exploitation | Un logiciel de base qui exécute tous les autres programmes sur un ordinateur. Windows, Linux, Android, macOS et iOS sont des exemples de systèmes d’exploitation.Source FFÉ.Synonyme : SE. |
Orbot | Noun | [Orbot] Name of application. Do not translate. | ||
Oudated | Adjective | désuet | ||
Out-of-band verification | Noun | "Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.Synonyms: out-of-bandSource EFF. | vérification hors bande | « Hors bande » signifie n’importe quelle méthode de communication qui n’est pas la méthode actuelle. Vérifier l’identité de la personne avec qui vous communiquez par un système non sécurisé exige souvent de communiquer hors bande par une autre méthode qui est moins vulnérable à la même sorte d’attaque. Vous pourriez donc par exemple vérifier que vous utilisez la bonne clé publique de quelqu’un en lui parlant en personne avant de l’utiliser pour chiffrer votre courriel.Synonyme : hors bandeSource FFÉ. |
Outdated | Adjective | désuet | ||
Outline | Noun | [Outline] Name of an application. Please **do not translate** the application name. If needed, you can transcribe the name and place it in parentheses after the original name. Ex: Psiphon (ሳይፈን) | ||
Outline Manager | Noun | [Outline] Name of a project. Please do not translate or transcribe the name. | ||
Overhead | Noun | surcharge | ||
Overview | Noun | [Globaleaks] | aperçu | Vue d’ensemble |
P.O. Box | Noun | |||
P2P | Adjective | pair à pair | Sans traits d’union en apposition. | |
Noun | ||||
PGP | Noun | [Mailvelope]"Pretty Good Privacy" PGP is a commercial software for cyphering | PGP | PGP (littéralement « confidentialité plutôt bonne » en anglais) était l’une des premières mises en œuvre populaires de la cryptographie par clé publique. Phil Zimmermann, son créateur, a écrit le programme en 1991 pour aider les activistes et autres à protéger leurs communications. Il a fait l’objet d’une enquête officielle du gouvernement américain quand le programme s’est propagé en dehors des États-Unis. Alors, l’exportation d’outils qui incluaient un chiffrement robuste par clé publique violait la loi américaine. PGP existe encore comme logiciel commercial. GnuPG (ou GPG), une mise en œuvre libre de la même norme utilisée par PGP est aussi offerte. Dans la mesure où les deux utilisent la même approche interchangeable, on parlera souvent d’utiliser une « clé PGP » ou d’envoyer un « message PGP » même si GnuPG est utilisé.Synonymes : logiciel de chiffrement PGP, logiciel PGPSource EFF. |
PIN | Noun | Personal Identification Number [Signal] | NIP | Numéro d’identification personnel |
PV | Noun | [QubesOS] "Paravirtualization"An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms. | PV | paravirtualisation |
PVHVM | Noun | [QubesOS] "Paravirtualization on Hardware Virtual Machine"To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers). | MVPVM | Machine virtuelle à paravirtualisation matérielle |
Padding | Noun | remplissage | ||
Pane | Noun | |||
Panic | Noun | Panic button, panic app | Urgence | Bouton d’urgence, appli d’urgence |
Passwords field | Noun | |||
Peer-to-Peer | Adjective | pair à pair | Sans traits d’union en apposition. | |
Perfect forward secrecy | Noun | A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.Synonyms: Forward secrecy.Source EFF. | Confidentialité persistante parfaite | Une propriété d’un système sécurisé de messagerie qui garantit la sécurité de vos communications passées même si l’une des clés privées est volée ultérieurement. Pour les sites HTTPS, la confidentialité persistante est une protection importante contre des adversaires tels que les agences de renseignement qui pourraient enregistrer une grande quantité du trafic et utiliser une clé volée pour le déchiffrer.Synonyme : confidentialité persistante.Source EFF. |
Perl | Noun | [CGIProxy] Name of a programming language or referring to a family of programming languages. Do not translate or transcribe. | ||
Persistence wizard | Noun | Assistant de persistance | ||
Phrases | Noun | phrases | ||
Pie Chart | Noun | [Martus] | graphique circulaire | |
Piece | Noun | morceau | ||
Plaintext | Noun | [Globaleaks] [Signal] | Texte brut / texte en clair | |
Plan | Noun | |||
Plans | Noun | |||
Pledge | ||||
Policy | Verb | |||
Pool | Noun | réserve | ||
Port forwarding | Noun | [Outline] Wikipedia: https://en.wikipedia.org/wiki/Port_forwarding | ||
Post | Noun | billet, article | billet de blogue, article de forum | |
Post | Verb | publier | ||
Post-traumatic stress | Noun | Stress post-traumatique | ||
Posted | Verb | publié | ||
Power Off | Verb | Éteindre | ||
Powering Digital Resisteance | Noun | |||
Premium | Noun | [Psiphon] | Pro | [Psiphon] |
Preparation | Noun | |||
Pretty Good Privacy | Noun | PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. (Synonyms: PGP) (Source: EFF) | PGP | PGP (littéralement « confidentialité plutôt bonne » en anglais) était l’une des premières mises en œuvre populaires de la cryptographie par clé publique. Phil Zimmermann, son créateur, a écrit le programme en 1991 pour aider les activistes et autres à protéger leurs communications. Il a fait l’objet d’une enquête officielle du gouvernement américain quand le programme s’est propagé en dehors des États-Unis. Alors, l’exportation d’outils qui incluaient un chiffrement robuste par clé publique violait la loi américaine. PGP existe encore comme logiciel commercial. GnuPG (ou GPG), une mise en œuvre libre de la même norme utilisée par PGP est aussi offerte. Dans la mesure où les deux utilisent la même approche interchangeable, on parlera souvent d’utiliser une « clé PGP » ou d’envoyer un « message PGP » même si GnuPG est utilisé.Synonymes : logiciel de chiffrement PGP, logiciel PGP.Source EFF. |
Primary | Noun | |||
Private Messenger | Private Messenger | |||
Proceed | Verb | |||
Promote | ||||
Promotion Text | Texte Promotionnel | |||
Protect | ||||
ProxyVM | Noun | [QubesOS] "Proxy Virtual Machine"A type of VM which proxies network access for other VMs | MVmandataire | |
PsiCash | Noun | [Psiphon] Do not translate or transliterate/transcribe "PsiCash". | PsiCash | [Psiphon] Ne doit pas être traduit. |
Psiphon | Noun | Name of an organization and application. Please **do not translate or transliterate/transcribe** this name. | Psiphon | |
Public Information File (*.mpi) | Noun | [Martus] Files containing the account's public information | Fichiers d’informations publiques (*.mpi) | |
Q&A | Noun | |||
QR code | Noun | [Signal, Orbot] | ||
Qubes Global Settings | Noun | [QubesOS] | paramètres généraux de Qubes | |
Qubes OS | Noun | [QubesOS] Do not translate "Qubes OS" | Qubes OS | |
Query | Noun | demande | ||
Questionnaire | ||||
RAM | Noun | mémoire vive | ||
RMI | Noun | |||
ROM | Noun | [Signal] | ||
Randomization | Noun | aléation | ||
Rate | Noun | débit ou taux | selon les cas | |
Read | Verb | |||
ReadMe | Noun | The ReadMe file included with any new software release that describes changes to software | LisezMoi | |
Reboot | Noun | redémarrage | ||
Reboot | Verb | redémarrer | ||
Record ID | Noun | ID du bulletin | ||
Reference Guide | Noun | |||
Referer | Noun | |||
Referer spoofing | Noun | |||
Refresh | Noun | actualisation | ||
Refresh | Verb | |||
Registration Lock | Noun | [Signal] | blocage de l’inscription | [Signal] |
Reject | Verb | refuser | ||
Release key | Noun | clé de parution | ||
Removable media | Noun | support amovible | ||
Removable media drive | Noun | unité amovible | ||
Repliable datagram | Noun | Datagramme répondable | ||
Required | Adjective | exigé | ||
Reseed | Verb | réensemencer | ||
Retry | Verb | ressayer | ||
Retweet | Noun | Retwittage | ||
Retweet | Verb | Retwitter | ||
Reusable Choice | Noun | |||
Revocation certificate | Noun | [Mailvelope] What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.Source EFF. | Certificat de révocation | Que se passe-t-il si vous perdez l’accès à une clé secrète ou si elle n’est plus secrète ? Un certificat de révocation est un fichier que vous pouvez générer pour annoncer que vous n’avez plus confiance dans cette clé. Vous le générez quand vous avez encore la clé secrète et le conservez en cas de désastre futur.Source EFF. |
Reward | Noun | prime | Synonyme : récompense | |
Rich Text | Noun | |||
Risk analysis | Analyse de risque | |||
Risk analysis | Noun | In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.Synonyms: Risk, Risk Assessment.Source EFF. | Analyse des risques | En sécurité informatique, l’analyse des risques consiste à calculer les chances de succès des menaces afin que vous puissiez évaluer l’effort à produire pour vous défendre contre elles. Il pourrait exister de nombreuses façons différentes de perdre le contrôle ou l’accès de vos données, mais certaines sont moins susceptibles de se présenter que d’autres. Évaluer le risque signifie décider quelles menaces vous allez prendre au sérieux et lesquelles pourraient être trop rares ou trop inoffensives (ou encore trop difficiles à combattre) pour s’en soucier.Voir Modélisation des menaces.Synonymes : risque, appréciation des risquesSource EFF. |
Risk assessment | Noun | In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.Synonyms: Risk, Risk analysis.Source EFF. | Appréciation des risques | En sécurité informatique, l’analyse des risques consiste à calculer les chances de succès des menaces afin que vous puissiez évaluer l’effort à produire pour vous défendre contre elles. Il pourrait exister de nombreuses façons différentes de perdre le contrôle ou l’accès de vos données, mais certaines sont moins susceptibles de se présenter que d’autres. Évaluer le risque signifie décider quelles menaces vous allez prendre au sérieux et lesquelles pourraient être trop rares ou trop inoffensives (ou encore trop difficiles à combattre) pour s’en soucier. Voir Modélisation des risques.Synonymes : risque, analyse du risque.Source EFF. |
Roadmap | Noun | calendrier de lancement | ||
Role-based access control | Noun | [Globaleaks] | Contrôle d'accès basé sur les rôles | |
Root | Noun | racine | ||
RouterInfo | Noun | InfosRouteur | ||
Ruleset Tests | Noun | |||
Running environment | Noun | environnement d'exécution | ||
Runtime | Noun | moteur d'exécution | ||
SAFETAG | Noun | Do not translate. Accronym for "Security Auditing Framework and Evaluation Template for Advocacy Groups" | ||
SD card | Noun | |||
SES (Suspicious Email Submitter) | Noun | [SES] Project Name. Please do not translate. | SES (Suspicious Email Submitter) | [SES] Nom du projet à ne pas traduire.Dans une phrase « diffuseur de courriels suspects, » |
SIM card | Noun | A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.Source EFF. | Carte SIM | Une petite carte amovible qui peut être insérée dans un appareil mobile afin de fournir un service auprès d’une entreprise de télécommunication mobile particulière. Les cartes SIM (carte d’identité de l’abonné) peuvent aussi enregistrer des numéros de téléphone et des messages texte.Source EFF. |
SMS | Noun | “SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.[1] It uses standardized communication protocols to enable mobile devices to exchange short text messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal] | texto | Synonyme : message texte |
SMTP | Noun | [Globaleaks] | ||
SOCKS | Noun | [Orbot] "Socket Secure (SOCKS) is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded." - Wikipedia (https://en.wikipedia.org/wiki/SOCKS) | ||
SSD (Solid-State Drive) | Noun | "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives."Source EFF | Disque électronique | Traditionnellement, les ordinateurs enregistraient les données sur des disques magnétiques rotatifs. Les appareils mobiles et un nombre croissant d’ordinateurs enregistrent maintenant les données permanentes sur des disques sans aucune pièce mécanique mobile. Ces disques électroniques sont actuellement plus coûteux, mais bien plus rapides que les mémoires magnétiques. Il peut malheureusement être plus difficile de supprimer de façon fiable et permanente des données d’un disque électronique.Synonyme : disque à semi-conducteurs, disque SSD.Source FFÉ. |
SSH | Noun | [KeepassXC] "Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users." - Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell) | Protocole SSH | Le protocole SSH est une méthode qui vous permet de contrôler un ordinateur à distance en toute sécurité par une interface en ligne de commande. Une des caractéristiques du protocole SSH est qu’en plus d’envoyer des commandes, vous pouvez aussi l’utiliser pour relayer en toute sécurité le trafic Internet entre deux ordinateurs. Pour mettre en place un lien SSH, le système distant doit exécuter un serveur SSH et la machine locale à besoin d’un programme client SSH.Source EFF. |
SSL | Noun | [TunnelBear, CGIProxy] "Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers." - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security) | ||
SSL Observatory | Noun | "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives."Source EFF | SSL Observatory | Ne devrait pas être dans le glossaire. |
SVM | Noun | Support Vector Machine | MVS | machine à vecteurs de support |
SVM (Support Vector Machine) | Noun | "In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis." - https://en.wikipedia.org/wiki/Support_vector_machine | ||
Satellite Provider | Noun | |||
Satori | Noun | [Tor] **Do not translate** "It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources. You can Install Satori from the Chrome Web Store." (Source: Tor Glossary) | ||
ScrambleSuit | Noun | [Tor] **Do not translate** "Scramblesuit is similar to obfs4 but has a different set of bridges." (Source: Tor Glossary) | ||
Screen Lock | Noun | [Signal] | Verrouillage de l’écran | |
Search | Noun | A search in a search engine. | Recherche | |
Search Engine | Noun | Moteur de recherche | ||
Search Results | Noun | Application menu item. | résultats de recherche | |
Secure Sockets Layer | Noun | |||
Secure Sockets Layer (SSL) | Noun | [TunnelBear, CGIProxy] The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL). (Synonyms: Transport layer security) (Source: EFF) | Protocole SSL | La technologie qui vous permet de maintenir une connexion sécurisée et chiffrée entre votre ordinateur et certains des sites Web et services Internet que vous visitez. Quand vous êtes connecté à un site Web grâce à cette technologie, l’adresse du site Web commence par https plutôt que par http. Son nom a officiellement été changé pour Sécurité de la couche de transport (TLS) en 1999, mais de nombreuses personnes continuent à utiliser l’ancien nom, le protocole SSL.Synonyme : sécurité de la couche de transport.Source EFF. |
Secure password database | Noun | A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them. (Synonyms: Password manager, password safe) (Source EFF) | Base de données sécurisée de mots de passe | Un outil qui peut chiffrer et enregistrer vos mots de passe grâce à un seul mot de passe maître, facilitant l’utilisation de plusieurs mots de passe différents sur des sites et des services différents sans avoir à les mémoriser.Synonymes : gestionnaire de mots de passe, coffre-fort à mots de passe.Source EFF. |
Security Auditing Framework and Evaluation Template for Advocacy Groups | Noun | |||
Security certificate | Noun | A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.(Synonyms: Digital certificate) (Source EFF) | Certificat de sécurité | Une façon de confirmer automatiquement qu’une clé publique est correcte (qu’elle est vraiment celle utilisée par une entité précise) afin de prévenir les attaques de l’intercepteur. Il est le plus souvent utilisé par les sites Web pour prouver à votre navigateur que vous avez une connexion sécurisée vers un vrai site et non quelque système qui manipulerait frauduleusement votre connexion,Synonyme : certificat numérique.Source EFF. |
Seed | Noun | graine | ||
Seeding | Noun | ensemencement ou propagation | ||
Sensitive | Adjective | sensible/délicat | Synonymes : critique, délicat, vitalDonnée délicate | |
Sensor | ||||
ServiceVM | Noun | "Service Virtual Machine"A VM the primary purpose of which is to provide a service or services to other VMs. | MVservice | |
Setting | Noun | paramètre | ||
Settings | Noun | [Signal] [Orbot] Application menu item. | paramètres | |
Short User Manual | Noun | petit guide d’utilisation | ||
Signal | Noun | [Signal] Name of application. Do not translate. | Signal | |
Size | ||||
Slim | ||||
Snowflake | Adjective | [Tor] Snowflake is a type of pluggable transport.This is a name, so is not translated. Although you can always add a transliteration to the first occurrence, between parenthesis. | ||
Software | Noun | |||
Solid State Drive | Noun | Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.Synonyms: SSD.Source EFF. | Disque électronique | Traditionnellement, les ordinateurs enregistraient les données sur des disques magnétiques rotatifs. Les appareils mobiles et un nombre croissant d’ordinateurs enregistrent maintenant les données permanentes sur des disques sans aucune pièce mécanique mobile. Ces disques électroniques sont actuellement plus coûteux, mais bien plus rapides que les mémoires magnétiques. Il peut malheureusement être plus difficile de supprimer de façon fiable et permanente des données d’un disque électronique.Synonyme : disque à semi-conducteurs, disque SSD.Source EFF. |
Speed Boost | Noun | [Psiphon] | Survitesse | [Psiphon] Avec une majuscule, car il s’agit du nom d’un produit Psiphon. |
Spyware | logiciel espion | Synonyme : espiogiciel | ||
Standalone(VM) | Noun | [QubesOS] "Standalone (Virtual Machine)"In general terms, a VM is described as **standalone** if and only if it does not depend on any other VM for its root filesystem. | MVautonome | Machine virtuelle autonome |
StandaloneHVM | Noun | [QubesOS] "Standalone Hardware Virtual Machine"Any HVM which is standalone (i.e., does not depend on any other VM for its root filesystem). | MVMautonome | Machine virtuelle matérielle autonome |
Standard Fields | Noun | |||
Stem | Noun | [Tor] "Stem is a Python(programming language) controller library for core Tor. If you want to control core Tor with python, this is for you." (Source: Tor Glossary) | ||
Sticker Pack | ||||
Street Address | ||||
Subtitle | Noun | [Globaleaks] | ||
Sure | ||||
Surname | Noun | |||
Sweatshirt | chandail en coton molletonné | |||
Sybil attack | Noun | [Tor] "The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network." (Source: Tor Glossary) | ||
Sync | Noun | |||
Sync Manager | Noun | |||
Sys admin | Noun | Synonym: system admin, system administrator | administrateur de système | |
TLS | Noun | [TunnelBear]"Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers." - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security) | ||
TOFU | Noun | Trust on first use:https://en.wikipedia.org/wiki/Trust_on_first_use | CÀPU | Confiance à la première utilisation :https://en.wikipedia.org/wiki/Trust_on_first_use |
TRIM | Noun | [VeraCrypt] "A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally." https://en.wikipedia.org/wiki/Trim_(computing) | ||
TRIM command | Noun | [VeraCrypt] "A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally." https://en.wikipedia.org/wiki/Trim_(computing) | ||
TTL | Noun | |||
Tails | Noun | [Tor] **Do not translate** Tails is an acronym for "The Amnesic Incognito Live System". "Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails." (Source: Tor Glossary) | Tails | |
Tails Installer | [Tails] Installeur de Tails | |||
Tails Installer | Noun | [Tor] **Do not translate** Tails is an acronym for "The Amnesic Incognito Live System". "Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails." (Source: Tor Glossary) | programme d’installation de Tails | |
Take a stand | ||||
Tamanho | ||||
TemplateBasedHVM | Noun | [QubesOS] "Template-Based Hardware Virtual Machine"Any HVM that depends on a TemplateVM for its root filesystem. | MVMsurModèle | |
TemplateBasedVM | Noun | [QubesOS] "Template-Based Virtual Machine"Any VM which depends on a TemplateVM for its root filesystem. | MVsurModèle | |
TemplateHVM | Noun | [QubesOS] "Template Hardware Virtual Machine"Any HVM which functions as a TemplateVM by supplying [QubesOS] its root filesystem to other VMs. | MVMModèle | Machine virtuelle matérielle modèle |
TemplateVM | Noun | [QubesOS] "Template Virtual Machine."Any VM which supplies its root filesystem to another VM. | MVModèle | |
Terms | Noun | [Outline] As in "terms of service" | ||
Terms & Privacy Policy | Noun | [Signal] | Conditions générales et politique de confidentialité | [Signal] |
Terms of Service | Noun | [Outline] | conditions générales d'utilisation | |
Text message | Noun | Synonym: SMS | texto | |
Thanks You | ||||
Throwaway | Noun | A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF) | Téléphone mobile jetable | Un téléphone qui n’est pas relié à votre identité, n’est utilisé que pour un nombre limité d’appels ou d’activités et qui peut être jeté, le cas échéant, si vous soupçonnez qu’il est suivi à la trace ou compromis. Les téléphones jetables sont souvent des téléphones mobiles prépayés, achetez comptant.Source EFF. |
Throwaway address | Noun | An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.Source EFF. | Adresse jetable | Une adresse courriel que vous utilisez une seule fois et plus jamais par la suite. Elle est utilisée pour se connecter à un service Internet sans révéler une adresse courriel associée à votre identité.Source EFF. |
Timestamp | Noun | |||
Toolkit | Noun | boîte à outils | ||
Tools | Noun | [Martus] Martus menu option. | Outils | |
Tor | Noun | [Orbot] | Tor | |
Tor Blog | Noun | Blogue de Tor | ||
Tor Browser | Noun | [Tor] **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) "Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and from anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real Internet (IP) address, and will not know who you are unless you explicitly identify yourself. In addition, Tor Browser is designed to prevent websites from “fingerprinting” or identifying you based on your browser configuration. By default, Tor Browser does not keep any browsing history. Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested)." (Source: Tor Glossary) | Navigateur Tor. | Toujours avec une majuscule au début de chacun des deux mots. |
Tor Browser Bundle | Noun | **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) | offre groupée du Navigateur Tor | Toujours avec une majuscule au début de chacun des deux mots. |
Tor Browser profile directory | Noun | **Do not translate "Tor" however you can translate "Browser"** Example in Spanish: Navegador Tor (altering the order because is more natural like that.) | répertoire de profil du Navigateur Tor | Toujours avec une majuscule au début de chacun des deux mots. |
Tor Launcher | Noun | [Tor] **Do not translate or transcribe "Tor"** "When you run Tor Browser for the first time, you see the Tor Launcher window. It offers you the option to connect directly to the Tor network, or to configure Tor Browser for your connection. In the second case Tor Launcher will take you through a series of configuration options." (Source: Tor Glossary) | Lanceur Tor | |
Tor Network Settings | Noun | paramètre du réseau Tor | ||
Tor News | Noun | |||
Tor Project | Noun | [Orbot, Tor] **Do not translate.** Organization name. Name can be transcribed dependent on language. "The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor." (Source: Tor Glossary) | Projet Tor | |
Tor bridge | Noun | [Tor] | ||
Tor log | Noun | [Tor] ""Tor log" is an automatically-generated list of Tor’s activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". If you don't see this option and you have Tor Browser open, you can navigate to the Torbutton (on the top left of the browser, to the left of the URL bar). Click the Tor button, then open Tor Network Settings. You should see an option at the bottom to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot." (Source: Tor Glossary) | ||
Tor messenger | Noun | [The Tor Project] | Messagerie Tor | [Le projet Tor] Toujours avec uns majuscule pour les deux mots. |
Tor network | Noun | [Tor] "Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues." (Source: Tor Glossary) | réseau Tor | |
Tor relay | Noun | [Tor] [Orbot] | relais Tor | [Le Projet Tor] |
Tor2Web | Noun | [Tor, Globaleaks] **Do not translate** "Tor2web is a project to let users access onion services without using the Tor Browser. NOTE: This is not as safe as connecting to the onion services via Tor Browser, and will remove all Tor-related protections the client would otherwise have." (Source: Tor Glossary) | ||
TorBirdy | Noun | [Tor] **Do not translate** "This extension configures Thunderbird to make connections over Tor." (Source: Tor Glossary) | TorBirdy | |
Torbutton | Noun | [Tor] "A button marked by a little green onion to the left of the URL bar. Its menu offers you "New Identity", "Security Settings..." and "Check for Tor Browser Update..." options." (Source: Tor Glossary) | BoutonTor | Toujours avec deux majuscules. |
Touch ID | Noun | [Signal] Specific to iOS | ||
Trademark | Noun | marque de commerce | ||
Two-Factor | Noun | à deux facteurs | ||
UDP | Noun | [Outline] Short for "User Datagram Protocol"Wikipedia: https://en.wikipedia.org/wiki/User_Datagram_Protocol | ||
UI | Noun | user interface | IU | interface utilisateur |
URL | Noun | [CGIProxy] | URL | |
URL bar | Noun | barre d’URL | ||
US $ | Noun | "USD" or "United States Dollar" | ||
USB drive | Noun | Specifically thumbdrives used as external storage. | clé USB | |
USB stick | Noun | clé USB | ||
UTF-16 | Noun | [CGIProxy] "UTF-16 (16-bit Unicode Transformation Format) is a character encoding capable of encoding all 1,112,064 valid code points of Unicode. The encoding is variable-length, as code points are encoded with one or two 16-bit code units (also see comparison of Unicode encodings for a comparison of UTF-8, -16 & -32)." Wikipedia: https://en.wikipedia.org/wiki/UTF-16 | ||
UTF-8 | Noun | [CGIProxy] "UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes." Wikipedia: https://en.wikipedia.org/wiki/UTF-8 | ||
UpdateVM | Noun | [QubesOS] | MVMiseàJour | |
Uploaded | Adjective | [Globaleaks] | téléversé | |
UsbVM | Noun | [QubesOS] | MVUsb | |
VM | Noun | [Qubes, Outline] "virtual machine" | ||
VPN | Noun | [Outline, Orbot, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.Synonyms: Virtual Private NetworkSource: EFF | RPV | Un réseau privé virtuel est un moyen de connecter votre ordinateur en toute sécurité au réseau d’une organisation à l’autre bout d’Internet. Quand vous utilisez un RPV, toutes les communications Internet de votre ordinateur sont compressées, chiffrées puis relayées vers cette autre organisation où elles sont déchiffrées, décompressées et envoyées ensuite à destination. Aux yeux du réseau de l’organisation ou de tout autre ordinateur sur Internet, la requête de votre ordinateur semble venir de l’intérieur de l’organisation, non d’un autre lieu. Les RPV sont utilisés par les entreprises pour fournir un accès sécurisé à des ressources internes (comme des serveurs de fichiers ou des imprimantes). Ils sont aussi utilisés par des individus pour contourner la censure et la surveillance locales.Synonyme : Réseau privé virtuelSource FFÉ. |
Vanilla Bridges | Noun | |||
Vidalia | Noun | |||
Virtual Machine (VM) | Noun | A software implementation of a machine (for example, a computer) which executes programs like a physical machine. | machine virtuelle (MV) | L’implémentation logicielle d'une machine (p. ex. un ordinateur) qui exécute des programmes comme une machine physique. |
Virtual Private Network (VPN) | Noun | [Outline, Orbot, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF) | Réseau privé virtuel (RPV) | Un réseau privé virtuel est un moyen de connecter votre ordinateur en toute sécurité au réseau d’une organisation à l’autre bout d’Internet. Quand vous utilisez un RPV, toutes les communications Internet de votre ordinateur sont compressées, chiffrées puis relayées vers cette autre organisation où elles sont déchiffrées, décompressées et envoyées ensuite à destination. Aux yeux du réseau de l’organisation ou de tout autre ordinateur sur Internet, la requête de votre ordinateur semble venir de l’intérieur de l’organisation, non d’un autre lieu.Les RPV sont utilisés par les entreprises pour fournir un accès sécurisé à des ressources internes (comme des serveurs de fichiers ou des imprimantes). Ils sont aussi utilisés par des individus pour contourner la censure et la surveillance locales.Synonyme : RPV.Source FFÉ. |
Virtual Private Network, VPN | Noun | [Orbot, Outline, Psiphon] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF) | ||
Virtual Private Server (VPS) | Noun | [Outline] Virtual Private Server | Serveur privé virtuel | |
VoIP Call | Noun | appel voix sur IP | ||
Voice over IP (VoIP) | Noun | Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.Synonyms: VoIP.Source EFF. | Voix sur IP | Toute technologie qui vous permet d’utiliser Internet pour des communications vocales avec d’autres utilisateurs d’un système voix sur IP ou pour recevoir des appels téléphoniques par Internet |
Volume Creation Wizard | Noun | |||
WAN | Noun | réseau étendu | ||
WWW-Authenticate header | Noun | [CGIProxy] | ||
Warning! | Interjection | ex: “Warning! Selecting 'OK' will permanently delete all files” | ||
Web Key Directory | Noun | annuaire de clés Web | ||
WebApp | Noun | appli Web | ||
Welcome | Noun | |||
WhisperBack | Noun | "WhisperBack" is an application written specifically to report bugs anonymously from inside Tails. | WhisperBack | |
WiFi | Noun | Wi-FI | ||
Windows | Noun | Operating system | ||
Work | Verb | |||
World Wide Web | Noun | Web | ||
XMPP | Noun | [Signal] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. | Protocole XMPP | Une norme ouverte pour la messagerie instantanée. Google utilise le protocole XMPP pour Google Talk, Facebook l’offrait, mais ce n’est plus le cas. Les services de messagerie instantanée indépendants qui n’appartiennent pas aux grandes sociétés utiliseront habituellement XMPP. Les services comme WhatsApp ont leur propre protocole fermé et secret.Source EFF. |
XSS | Noun | script intersites | ||
XXL | Noun | Extra extra large. Clothing size. | ||
YYYY | Noun | “Year” Indicates that user must input a 4-digit year (ex: 1990) | ||
Zip | Noun | Abbreviation of 'Zip Code' or 'Postal Code' | ||
accept | Verb | [Signal] | accepter | |
access | Noun | accès | ||
access | Verb | accéder | ||
access key | Noun | [Outline] | ||
access mode | Noun | mode d’accès | Suivant le contexte | |
access token | Noun | [Martus]Short identification number used to add Contacts to your Martus account. | jeton d’accès | |
accessibility | Noun | |||
account | Noun | compte | ||
account recovery | Noun | [Mailvelope] | récupération de compte | |
account recovery code | Noun | [Mailvelope] | code de récupération de compte | |
accountability | Noun | imputabilité | ||
acknowledge | Verb | An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment" | reconnaître | Synonymes : accuser réception, approuver[Peerio] approuver |
acknowledged | Adjective | An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment" | approuvé | [Peerio] |
acknowledgment | Noun | American English — A button in Peerio that functions similar to a message, but sends a "thumbs up" icon with a timestamp. The thumbs-up icon is referred to as an "acknowledgment" | reconnaissance | Synonymes : accusé de réception, approbation.[Peerio] approbation |
acquire | Verb | acquérir | ||
activate | Verb | [Orbot] | ||
active | Adjective | actif | ||
activist | Noun | |||
activity | Noun | [SAFETAG] In the context of SAFETAG: The practices and interactions that the organization carries out in order to accomplish their goals. | activité | |
actor | Noun | [SAFETAG] In the context of SAFETAG: The staff, volunteers, partners, beneficiaries, donors, and adversaries associated with the organization. | ||
ad provider | Noun | [Psiphon] | fournisseur de publicité | |
ad-blocker | Noun | bloqueur de publicité | ||
add | Verb | ajouter | ||
add-on | Noun | [Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF) | greffon | Un logiciel qui modifie une autre application, changeant son fonctionnement et ce qu’elle peut faire. Les greffons peuvent souvent ajouter des fonctions de confidentialité ou de sécurité aux navigateurs Web ou aux logiciels de courriel. Certains greffons sont malveillants, veillez donc à n’installer que des greffons réputés provenant de sources officielles.Dans Chrome > extensionDans Firefox > module complémentaireSynonymes : extensions, plugiciels.Source FFÉ. |
additional software | [Tails] logiciel additionnel | |||
address | Noun | adresse | ||
address | Verb | (1) To address a situationSynonyms: to fix, to take care of(2) Give to data or a data set an address in memory(3) If a letter, envelope, or parcel is addressed to you, your name and address have been written on it. | remédier | (1) Synonymes : régler, résoudre, corriger une situation(2) Donner à un ensemble de données ou à une donnée une adresse en mémoire(3) Si une lettre, une enveloppe ou un paquet vous est adressé, vos nom et adresse ont été écrits dessus. |
address bar | Noun | barre d’adresse | ||
address book | Noun | carnet d’adresses | ||
admin | Noun | [Outline] Short for "administrator". | ||
administrative | Adjective | |||
advance | Verb | |||
advanced | Adjective | avancé | Synonymes : évolué, sophistiqué | |
advanced options | Noun | options évoluées | Synonyme : options avancées | |
advanced search | Noun | [Martus] | recherche approfondie | |
advanced user | Noun | utilisateur expérimenté | ||
adversary | Noun | Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.Source EFF. | adversaire | Votre adversaire est la personne ou l’organisation qui tente de miner vos objectifs de sécurité. Les adversaires diffèrent selon la situation. Vous pourriez par exemple vous soucier de criminels qui vous espionneraient sur le réseau d’un café ou encore de vos compagnons de classe. L’adversaire est souvent hypothétique.Source FFÉ. |
agency building | Noun | [SAFETAG] "...building the organization's agency" To increase an organization's ability to make decisions and do things on their own. | ||
agent | Noun | agent | ||
air gap | Noun | A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.Source EFF.An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated from all other networks.Source Wikipedia | isolement | Un ordinateur ou un réseau est isolé quand il est physiquement tenu à l’écart de tous les autres réseaux, incluant Internet.Source FFÉ. |
air-gapped (air gapped) | Adjective | isolé | isolé dans le réseau | |
alpha | Noun | version alpha | ||
alternate | Adjective | de substitution | Synonymes : de substitution, de remplacement, de rechange, alternant, alterné, cyclique, en alternance, périodique, alternatif, autre. | |
alternate | Noun | |||
alternative | Adjective | de substitution | Synonymes : de substitution, de remplacement, de rechange, alternant, alterné, cyclique, en alternance, périodique, alternatif, autre. | |
alternative | Noun | alternative | Synonymes : substitut, remplacement, solution, solution de remplacement, solution de rechange, autre possibilité, possibilité, éventualité, option, choix.Le mot alternative communique un choix entre deux possibilités (se trouver devant une alternative difficile), alternance (au pluriel) (des alternatives de chaud et de froid), contrairement au terme anglais « alternative » qui désigne chacune des possibilités. | |
ambiguous | Adjective | ambigu | ||
analytics | Noun | analyse | Synonyme : Procédures analytiques. | |
anomaly | Noun | [Globaleaks] | anomalie | |
anonymity | Noun | [Orbot, CGIProxy] | anonymat | |
anonymization | Noun | "It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous." (Source: https://en.wikipedia.org/wiki/Data_anonymization) | anonymisation | Supprimer des informations nominatives se trouvant dans un document afin de rendre virtuellement impossible l’identification des personnes. |
anonymize | Verb | [Orbot, Signal, Outline] To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization) | anonymiser | Supprimer des informations nominatives se trouvant dans un document afin de rendre virtuellement impossible l’identification des personnes. |
anonymous | Adjective | [Orbot, Outline] | anonyme | |
antivirus | Noun | [Outline, Tor] Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.Source EFF. | antivirus | Un logiciel qui tente de protéger un appareil contre l’emprise d’un programme malveillant. Les virus étaient parmi les premiers programmes malveillants et les plus répandus. Ils étaient appelés virus pour refléter la façon dont ils se propageaient d’appareil en appareil. De nos jours, la plupart des logiciels antivirus se concentrent sur deux choses : vous avertir si vous vous apprêtez à télécharger un fichier suspect d’une source externe et examiner les fichiers sur votre ordinateur pour vérifier s’ils correspondent à l’idée que le logiciel se fait d’un programme malveillant.Un logiciel antivirus ne peut reconnaître des programmes malveillants que s’ils sont pour l’essentiel semblables aux échantillons que les développeurs du programme antivirus ont déjà analysés. C’est pour cela qu’il est bien moins efficace pour combattre un programme malveillant ciblé, conçu pour infiltrer une communauté ou une personne précise, plutôt que des souches virales malveillantes répandues. Certains programmes malveillants sophistiqués peuvent attaquer activement un logiciel antivirus ou s’y soustraire.Source FFÉ. |
app | Noun | [Orbot, Tor] Abbreviation of "application." (Synonyms: application) | appli | Au pluriel, on écrira : des applis. |
app switcher | Noun | [Signal] Specific to iOS | sélecteur d’applis | |
application | Noun | [Orbot] An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. (Source: https://en.wikipedia.org/wiki/Application_software) [Signal] | application | Ensemble de programmes qui aident un utilisateur à accomplir une tâche donnée. Synonymes : logiciel d’application, application, programme d’application, logiciel applicatif, applicatif. |
apply | Verb | appliquer | ||
approach | Noun | approche | Manière d’aborder une question, un problème. Synonymes : approche, méthode, démarche, optique, point de vue, manière de voir. | |
approve | Verb | approuver | ||
archive | Noun | An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.https://en.wikipedia.org/wiki/Archive_file | fichier compressé | Fichier dont les données sont compressées à l’aide d’un algorithme afin d’économiser de l’espace disque.Synonymes : fichier comprimé, exécutable compressé. |
archive | Verb | [Signal] | archiver | Écrire un document de la mémoire interne vers un support externe. |
argument | Noun | argument | Nombre ou chaîne de caractères qui précise une commande et qui influence son fonctionnement. | |
arrive | Verb | arriver | ||
article | Noun | article | ||
as root | Noun | en tant que superutilisateur | ||
asset | Noun | In threat modeling, any piece of data or a device that needs to be protected.Source EFF. | actif | En modélisation de la menace, toute donnée ou tout appareil qui a besoin d’être protégé.Source EFF. |
asymmetric-key encryption | Noun | Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for messaging, and SSL/TLS for web browsing.Synonyms: Public key encryption, Public key cryptography. Source: EFF | chiffrement par clé asymétrique | Les systèmes de chiffrement traditionnels utilisent le même secret ou clé pour chiffrer et déchiffrer un message. Donc si je chiffre un fichier avec le mot de passe « monstrebleutonique », il vous faudra à la fois le fichier et le secret « monstrebleutonique » pour le décoder. Le chiffrement par clé publique utilise deux clés : l’une pour chiffrer et l’autre pour déchiffrer. Les conséquences utiles sont nombreuses. L’une est que vous pouvez donner la clé pour que l’on chiffre des messages à votre intention et que tant que vous conserverez l’autre clé secrète, quiconque possède cette clé peut communiquer avec vous en toute sécurité. La clé que vous distribuez est appelée « clé publique », d’où le nom de la technique. Le chiffrement par clé publique est utilisé pour chiffrer les courriels et les fichiers avec PGP, OTR pour la messagerie instantanée et SSL/TLS pour la navigation Web.Synonymes : chiffrement par clé publique, cryptographie par clé publique.Source FFÉ. |
at the Heart of Internet Freedom | ||||
attach | Verb | To attach a file to a message | joindre | Synonyme : annexer |
attachment | Noun | [Signal] File sent together with an email or other electronic message. | fichier joint | Fichier annexé à un message électronique, courriel ou autre, récupérable par le destinataire. Synonyme : pièce jointe., p. j., fichier annexé. |
attack | Noun | In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."Source EFF. | attaque | En sécurité informatique, une attaque est une méthode qui peut être utilisée pour compromettre la sécurité ou l’utilisation même d’un système. Un attaquant est la personne ou l’organisation menant l’attaque. Une méthode d’attaque est parfois appelée « exploitation ».Source FFÉ. |
attacker | Noun | assaillant | ||
audio | Adjective | [Signal] | ||
audio | Noun | audio | Relatif aux sons, aux enregistrements, à la reproduction.Au pluriel, l’adjectif audio peut rester invariable ou prendre un s conformément à l’orthographe rectifiée des fichiers audio ou audios, des équipements audio ou audios. | |
audit | ||||
auditor | Noun | |||
auth token | Noun | [Orbot] | jeton d’authentification | |
authenticate | Verb | authentifier | Contrôler l’identité déclarée d’une personne ou autre entité. Garantir l’origine et l’intégrité des messages transitant par un réseau informatique.Synonyme : prouver l’identité. | |
authenticated | Adjective | authentifié | ||
authentication | Noun | [TunnelBear, CGIProxy, Signal] | authentification | Vérification ou validation de l’identité d’une personne ou autre entité. Contrôle de l’accès à un réseau informatique, à un système ou programme. Elle peut faire appel à des techniques de cryptographie asymétrique, à des identifiants (nom d’utilisateur ou NIP), aux mots ou phrases de passe et aux signatures numériques associées. |
author | Noun | auteur | ||
authority | Noun | |||
authorize | Verb | autoriser | Synonyme : donner un droit d’usage | |
automated traffic | Noun | trafic automatisé | ||
autonomous system number | Noun | |||
availability | Noun | |||
available | Adjective | proposé, offert, disponible | En français, le mot disponible signifie :Dont on peut disposer (documentation disponible pour consultation), qui n’est pas occupé, libre (je suis disponible les fins de semaine). Il constitue un anglicisme si on lui donne le sens de :* offert (la nouvelle version est disponible dès janvier)* en vente, sur le marché (un logiciel disponible à bon prix).En informatique et télécommunication, « disponible » qualifie un état ou une condition permettant à une unité fonctionnelle d’accomplir une fonction requise lorsque les ressources externes nécessaires sont accessibles et que l’unité fonctionnelle est sous la commande de l’utilisateur. Synonymes : offert, proposé, disponible, libre. | |
avatar | Noun | A computer generated visual icon used as an alternative digital fingerprint. aka "identicon". [Signal] | avatar | * Personnage numérique, réaliste ou fantaisiste, qui représente le joueur ou l’utilisateur dans un monde virtuel* Icône générée par ordinateur utilisée comme empreinte numérique.Synonyme : identicône |
back | Adverb | |||
back | Noun | As in “Back” button | retour | Bouton Retour |
back | Verb | As in "to back up" or "to back down". | ||
back up | Verb | |||
backend | Noun | Backend app. | Dorsale | Appli dorsale. |
background | Noun | Screen surface where text and graphic elements are displayed | arrière-plan | Zone de l’écran sur laquelle les éléments graphiques et textuels apparaissent |
background process | Noun | processus d’arrière-plan | ||
background program | Noun | programme d’arrière-plan | ||
backlog | Noun | Delayed processing of some sort | arriéré | Retard dans un domaine quelconque |
backup | Noun | [Signal] [Orbot] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely. | sauvegarde | Copie de données, mise à jour régulièrement ou non afin d’en permettre la restauration en cas de perte. Elle peut être enregistrée localement, dans le nuage ou sur un support amovible tel un disque optique ou une clé USB. Cette dernière option permet de stocker les sauvegardes en sécurité. |
backup key file | Noun | [Martus] Also: key backup | ||
badge | Noun | [Signal] | ||
balance | Noun | What is left to be paid or recovered. | solde | Ce qui reste d’une somme à payer ou à recouvrer. |
bandwidth | Noun | [Tor][Orbot] | bande passante | |
bank fees | ||||
bar | Noun | |||
bar chart | Noun | graphique à barres | ||
bare-metal | Adjective | nu | Aussi : vierge, sans système d’exploitation | |
barrier | Noun | [SAFETAG] Barriers are specific challenges an organization faces that might limit or block its capacity. | ||
base | ||||
batch select | Noun | [Signal] | ||
battery | Noun | pile | Il ne faut pas confondre la pile et la batterie. Une batterie est un assemblage constitué d'au moins deux piles. En français, le mot batterie est souvent employé à tort pour désigner une seule pile, la plupart du temps rechargeable. | |
be careful | ||||
benchmark | Noun | test de performance | ||
benign | Adjective | inoffensif | ||
best-effort delivery | Noun | livraison au mieux | ||
beta | Noun | Bêta | ||
big data | Noun | mégadonnées | Ensemble des données, structurées ou non, produites en continu et en temps réel, et dont la croissance est exponentielle. | |
billing | ||||
binaries | Noun | |||
binary | Noun | [KeepassXC, CGIProxy] Binary file.8-bit encoded data file using only 0 and 1, different from ASCII which is 7-bit encoded. | fichier binaire | Fichier de données encodées sur 8 bits en utilisant seulement des 0 et des 1, différent d’ASCII encodé sur 7 bits. |
block | ||||
block | Noun | blocage | ||
block | Verb | [Signal] | bloquer | |
blocked | Adjective | bloqué | ||
blocked access | Noun | accès bloqué | ||
blockfile | Noun | [I2P] http://www.i2p2.de/blockfile.html | blockfile | [I2P] En référence au format de fichiers, service de noms blockfile.https://geti2p.net/spec/blockfile |
blocking | Noun | Synonyms: filtering, censoring Internet traffic. | blocage | Synonyme : filtrage, censure du trafic Internet. |
blocking resistant | Adjective | résistant au blocage | ||
blog | Noun | blogue | ||
blog post | Noun | Short text posted to a blog, the content of which is left entirely to the discretion of the author. | billet, article | Court texte qui est publié dans un blogue et dont le contenu est à l'entière discrétion de l’auteur.Synonyme : billet de bloqueSi le texte est plus long, on parle d’un article de blogue. |
blogging | Noun | Posting to a blog and updating it regularly. | blogage | Publier un blogue et à le mettre à jour régulièrement. |
body | Noun | corps | ||
bookmark | Noun | marque-page | Synonyme : signet | |
boolean | Adjective | [KeepassXC] | booléen | |
boolean | Noun | |||
boot | Noun | [Orbot] | amorçage | |
boot | Verb | [Orbot] | amorcer | |
boot loader | Noun | bootloader | programme d’amorçage | |
bootable | Adjective | amorçable | ||
bootloader | Noun | Synonyms: boot loader | programme d’amorçage | |
bot | Noun | |||
botnet | Noun | réseau de zombies | ||
bounce | Verb | |||
bouncing | ||||
bounty | Noun | prime | ||
box | Noun | boîte | ||
break in | Noun | |||
bridge | Noun | [Orbot, Tor] Like ordinary Tor relays, bridges are run by volunteers; unlike ordinary relays, however, they are not listed publicly, so an adversary cannot identify them easily. Pluggable transports are a type of bridge that help disguise the fact that you are using Tor. (Source: Tor Glossary) | pont | |
bridge | Verb | [Tor] | relier par un pont | |
bridge line | Noun | [Tor] a line with the bridge configuration | ligne de pont | |
bridge relay | Noun | [Tor] | relais-pont | |
bridge type | Noun | [Tor] | ||
broad range | ||||
broadcast | Verb | [Signal] | ||
browse | Verb | [Orbot, CGIProxy] | parcourir / naviguer | |
browser | Noun | [Outline, CGIProxy] web browser | navigateur | |
browser fingerprint | Noun | [Tor] The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.Source EFF. | empreinte de navigateur | Les diverses propriétés de votre navigateur Web ou de votre ordinateur qu’un site Web peut relever quand vous le visitez. Elles peuvent être légèrement différentes des autres navigateurs ou ordinateurs, ce qui peut être une façon de vous reconnaître même si vous ne vous connectez pas, même si votre ordinateur n’enregistre pas de témoins et même si vous vous connectez à Internet à partir d’un réseau différent à l’avenir. Par exemple, vous pourriez être la seule personne qui utilise un site particulier à partir d’un appareil réglé pour une certaine langue, avec une taille d’écran précise et qui utilise une certaine version d’un navigateur Web ; par la suite, le site pourrait réaliser qu’il s’agit de vous chaque fois que vous le visitez, même si vous ne faites rien pour divulguer votre identité.Source FFÉ. |
brute force attack | Noun | attaque en force | ||
buffer | Noun | mémoire tampon | ||
bug | Noun | bogue | ||
bug report | Noun | [Signal] | relevé de bogue | |
build | Verb | Build a program from its source. | compiler | Compiler un programme à partir de sa source |
bundle | Noun | offre groupée | http://www.culture.fr/franceterme/result?francetermeSearchTerme=bundle&francetermeSearchDomaine=0&francetermeSearchSubmit=rechercher&action=search | |
bundled | Adjective | |||
burden | ||||
burden | Noun | |||
burner phone | Noun | A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)(Source: EFF) | téléphone jetable | Un téléphone qui n’est pas relié à votre identité, n’est utilisé que pour un nombre limité d’appels ou d’activités et qui peut être jeté, le cas échéant, si vous soupçonnez qu’il est suivi à la trace ou compromis. Les téléphones jetables sont souvent des téléphones mobiles prépayés, achetez comptant.Source FFÉ. |
button | Noun | bouton | ||
bypass | Verb | |||
bytes | Noun | [KeePassXC, CGIProxy, Globaleaks] | ||
cache | Noun | cache | ||
cache | Verb | |||
cache-busting | Noun | attaque visant à briser le cache | ||
calendar | Noun | calendrier | ||
camera | Noun | appareil photo | Dans certains cas, caméra. | |
camouflage | Noun | |||
cams | ||||
cams | Noun | |||
cancel | Verb | [Signal] | ||
canonicalization | Noun | |||
capability | Noun | The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.Source EFF. | possibilité d’action | La possiblité d’action d’un attaquant (dans le contexte d’une attaque) est ce qu’il peut faire pour atteindre ses objectifs. Par exemple, les services de sécurité d’un pays pourraient avoir la capacité d’écouter les appels téléphoniques, alors qu’un voisin pourrait avoir la capacité de vous surveiller de sa fenêtre. Dire qu’un attaquant a une capacité ne signifie pas nécessairement qu’il l’utilisera. Cela signifie cependant que vous devriez envisager cette possibilité et vous y préparer.Source FFÉ. |
capacity | Noun | [SAFETAG] Indicators of capacity include staff skills and a wide variety of resources that an organization can draw from to affect change. | ||
car documents | Noun | [Umbrella] | documents de bord | [Umbrella] |
card number | Noun | |||
carjacking | Noun | piraterie routière | ||
carry | ||||
carry | Verb | |||
case management | Noun | [GlobaLeaks] | gestion des cas | |
cash | ||||
cash | Noun | |||
cc | Noun | “carbon copy” | Cc | |
cellular service | Noun | service de téléphonie mobile | ||
censor | ||||
censor | Noun | |||
censored | ||||
censored | Adjective | censuré | ||
censorship | Noun | [Signal] | censure | |
cerificate | ||||
certificate | Noun | [TunnelBear][KeePassXC] | certificat | |
certificate | Verb | [TunnelBear][KeePassXC]To give a certificate | ||
certificate authority | Noun | autorité de certification | ||
certificate chain | Noun | [Globaleaks] | chaîne de certification | |
certificate chain file | Noun | [Globaleaks] | ||
certificates | Noun | Is it needed, the plural form defined here? The singular already exists. | ||
chain | Noun | chaîne | ||
change | Verb | |||
change log | Noun | journal des changements | ||
changelog | Noun | [Tor] | journal des changements | |
charges | ||||
charges | Noun | |||
charset | Noun | [CGIProxy] "...a repertoire of characters and how they were to be encoded into a stream of code units – usually with a single character per code unit." Wikipedia: https://en.wikipedia.org/wiki/Character_encoding | ||
chart | Noun | graphique | ||
chat | Noun | [Signal] | dialogue en ligne | Synonyme : clavardage |
chat | Verb | [Signal] | converser | |
check | Verb | relever | terme employé par Thunderbird dans sa traduction, proposé ici pour maintenir la cohérence d'ensemble | |
checking | ||||
checkpoint | Noun | poste de contrôle | ||
checksum | Noun | [Tor] Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical. (Source: Tor Glossary) | somme de contrôle | |
chipset | Noun | jeu de puces | ||
choke | Verb | étrangler | ||
chokepoint | Noun | goulet d’étranglement | ||
choker | Noun | étrangleur | ||
choose | Verb | |||
chronic stress | Noun | stress chronique | ||
chunk | Verb | [CGIProxy] "Chunking is a specific feature of the HTTP 1.1 protocol...It refers to a facility that allows inconveniently large messages to be broken into conveniently-sized smaller "chunks"." Wikipedia: https://en.wikipedia.org/wiki/Chunking_(computing) | ||
cipher | Noun | [KeepassXC]Coding principle based on the substitution of a character by another or possibly several others, ran by a variable complexity transformation algorithm. | chiffre | Principe de codage basé sur la substitution d'un caractère par un autre ou éventuellement par plusieurs autres, exécutée grâce à un algorithme de transformation de complexité variable. |
ciphertext | Noun | |||
circuit | Noun | [Tor, Orbot] A path through the Tor network built by clients consisting of randomly selected nodes. The circuit begins with either a bridge or a guard. Most circuits consist of three nodes - a guard or bridge, a middle relay, and an exit. Most onion services use six hops in a circuit (with the exception of single onion services), and never an exit node. You can view your current Tor circuit by clicking on the onion button in Tor Browser. (Source: Tor Glossary) | circuit | |
circuits | ||||
circuits | Noun | circuits | ||
circumvent | Verb | [Orbot] | contourner | |
circumvention | Noun | [Signal] [Orbot] | contournement | |
clear | Adjective | |||
clear | Verb | [Signal] [Orbot] | effacer | |
cleartext | Noun | |||
click | Noun | |||
click | Verb | [Signal, Outline] | sélectionner | Par souci d’accessibilité, cliquer devrait être évité et remplacer par « sélectionner » pour tous les utilisateurs qui n’ont jamais à cliquer. |
click and hold | Verb | |||
click-to-play | Noun | cliquer pour lire | ||
clickjacking attack | Noun | |||
client | Noun | [Signal, Tor, Orbot] As in "desktop client" or "Android client." "In Tor, a client is a node in the Tor network, typically running on behalf of one user, that routes application connections over a series of relays." (Source: Tor Glossary) | client | |
clipboard | Noun | [Signal] | presse-papiers | |
clock skew | Noun | décalage d’horloge | ||
close | Verb | fermer | ||
cloud provider | Noun | [Outline] | ||
cloud server | Noun | [Orbot] | serveur nuagique | |
cloud service | Noun | service nuagique | ||
cloud storage | Noun | stockage nuagique | ||
coarse data | Noun | Unprocessed data | données brute | Données qui n’ont pas encore été traitées. |
code | Noun | code | ||
codec | Noun | |||
collection | Noun | |||
collusion | Noun | collision | ||
collusion attack | Noun | attaque en collusion | ||
color | Noun | |||
column | Noun | |||
command | Noun | |||
command and control server | Noun | A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: C&C, C2.Source EFF. | serveur de commandement | Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. |
command line | Noun | [CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations. Source EFF. | ligne de commande | |
command-and-control server | Noun | A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: C&C, C2.Source EFF. | serveur de commandement | Un serveur de commandement est un ordinateur qui donne des ordres aux appareils infectés par un programme malveillant et qui reçoit des informations de ces appareils. Certains serveurs de commandement contrôlent des millions d’appareils.Source FFÉ. |
comment | Noun | [Globaleaks] | ||
commercial VPN | Noun | A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, untrusted local ISPs, or anyone else spying on your local network. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The downside is that the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to spy on your traffic.Source EFF. | RPV commercial | Un réseau privé virtuel commercial est un service privé qui offre de relayer par son propre réseau, en toute sécurité, vos communications Internet. L’avantage est que toutes les données que vous envoyez ou recevez sont dissimulées aux yeux des réseaux locaux. Cela assure à vos données une meilleure sécurité contre les criminels du voisinage, les FAI locaux non fiables ou quiconque pourrait espionner votre réseau local. Un RPV peut être hébergé dans un pays étranger, ce qui est utile à la fois pour protéger les communications contre un gouvernement local et pour contourner la censure nationale. L’inconvénient est que le trafic est déchiffré du côté du RPV commercial. Cela signifie que vous devez faire confiance au RPV commercial (et au pays où il se situe) pour qu’ils ne surveillent pas votre trafic.Source FFÉ. |
communicate | Verb | |||
communication | Noun | |||
community | Noun | communauté | ||
community center | Noun | centre communautaire | ||
companies | Noun | |||
compartmentalization | Noun | cloisonnement | ||
compartmentalize | Verb | cloisonner, compartimenter | ||
compatible | Adjective | [Outline] | compatible | |
complete | Verb | terminer | ||
completed | Adjective | terminé | ||
component | Noun | composant | ||
compose | Verb | [Signal] | rédiger | |
compressed | Adjective | comprimé | ||
compression | Noun | compression | ||
compression/decompression tool | Noun | |||
compromise | Verb | |||
compromised | Noun | [Globaleaks] | ||
computer | Noun | [Signal] | ||
concordance | Noun | |||
conference | Noun | |||
confidentiality | Adjective | [Globaleaks] [Orbot] | ||
configuration | Noun | [Globaleaks] [Orbot] | ||
configure | Verb | [Signal, Outline, Orbot] | ||
confirm | Verb | |||
connect | Verb | [Signal, Outline] | ||
connecting | Verb | |||
connection | Noun | [Orbot, Outline] | connexion | |
connectivity | Noun | [Orbot, Outline] | ||
consensus | Noun | [Tor] In Tor terms, a single document compiled and voted on by the directory authorities once per hour, ensuring that all clients have the same information about the relays that make up the Tor network. (Source: Tor Glossary) | consensus | |
constraint | Noun | |||
contact | Noun | [Signal] [Martus] Another Martus user with whom you can share your Martus bulletins. | contact | |
contact | Verb | |||
contact info | Noun | renseignements de contact | ||
contact information | Noun | coordonnées | ||
contact request | Noun | demande de contact | ||
container | Noun | |||
content | Noun | |||
context | Noun | [Globaleaks] Tips are classifies in contexts, e.g. corruption | Contexte | |
contributors | Noun | |||
control panel | Noun | panneau de configuration | ||
control port | Noun | port de contrôle | ||
conventional | Adjective | classique, traditionnel, conventionnel (rarement) | ||
conversation | Noun | A "conversation" is the same as a message "thread" [Signal] | conversation | |
cookie | Noun | [Tor, CGIProxy, Orbot] Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in. (Source : EFF) | témoin | Les témoins sont une technologie Web qui permet aux sites Web de reconnaître votre navigateur. Les témoins étaient à l’origine conçus pour permettre aux sites de vous offrir des paniers d’achats, d’enregistrer vos préférences ou d’assurer votre connexion à un site. Ils permettent aussi le suivi à la trace et le profilage afin que les sites puissent vous reconnaître et en apprendre davantage sur votre navigation, les appareils que vous utilisez et ce qui vous intéresse, même si vous n’avez pas de compte sur ce site et n’y êtes pas connecté. (Synonyme : fichier témoin) (Source : FFÉ) |
copy | Verb | |||
copyright notice | Noun | avis de droit d’auteur | ||
core Tor | Noun | [Tor] "Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues." (Source: Tor Glossary) | noyau Tor | |
corporate foundation | ||||
corporate intranet | Noun | Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.Source EFF. | Intranet d’entreprise | Les entreprises et autres sociétés d’envergure offriront habituellement certains services (par exemple courriel, Web, accès aux fichiers et aux imprimantes) accessibles de leur propre réseau local, mais pas de l’extérieur par Internet. La plupart des compagnies considèrent cette sécurité suffisante pour protéger leurs documents internes, mais cela signifie que n’importe quelle attaque qui peut se connecter à l’intranet peut aussi accéder ou interférer avec toutes les informations conservées localement. Un exemple d’une telle attaque serait d’amener un employé, par la ruse, à installer un programme malveillant sur son ordinateur portable. Afin de permettre aux employés de se connecter à l’intranet à partir d’Internet, les entreprises fourniront souvent leur propre réseau privé virtuel (RPV) qui crée une connexion sécurisée vers l’intranet accessible partout dans le monde.Source FFÉ. |
countries | Noun | |||
country | Noun | |||
country code | Noun | In a phone number | indicatif de pays | Dans un numéro de téléphone |
crash | Noun | plantage | ||
crash report | Noun | rapport de plantage | ||
create | Verb | |||
credentials | Noun | [KeepassXC] | identifiant | Synonyme : authentifiant, renseignements, références |
credits | Noun | crédits | ||
critical | ||||
cropping | Noun | rognage | ||
cross-certification | Noun | certification croisée | ||
cross-site scripting | Noun | [Tor] Cross-Site Scripting (XSS) allows an attacker to add malicious functionality or behavior to a website when they shouldn't have the ability to do so. (Source: Tor Glossary) | script intersites | |
crucial | Adjective | |||
cryptocurrency | Noun | cryptomonnaie | ||
cryptographers | ||||
cryptographic signature | Noun | [Tor] The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Synonyms: digital SignatureSource EFF. | signature cryptographique | Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer aussi qu’elle n’a pas été modifiée depuis qu’elle a été écrite. Les signatures numériques peuvent être utilisées avec les téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle publiée et que personne ne l’a manipulé frauduleusement. Elles sont aussi souvent utilisées pour le courriel chiffré et à de nombreuses autres fins. Si une information n’est pas protégée par une signature numérique, un fournisseur d’accès à Internet ou autre fournisseur de services de communication pourrait modifier le contenu de ce quelqu’un a écrit ou publié et il n’existerait aucun moyen technique de détecter ce qu’il s’est passé.Synonyme : signature numérique.Source FFÉ. |
cryptography | Noun | The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.Source EFF. | cryptographie | L’art de concevoir des codes secrets ou chiffres qui vous permettent d’envoyer ou de recevoir des messages à un destinataire sans que les autres puissent comprendre le message.Source FFÉ. |
cryptoparty | Noun | When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: key-signing party.Source EFF. | chiffrofête | Quand vous utilisez le chiffrement par clé publique, il est important de vous assurer que la clé que vous utilisez pour chiffrer un message appartient vraiment au destinataire (voir Vérification de clé). PGP facilite un peu ce processus en permettant de dire aux autres « Je croie que cette clé appartient à cette personne et si vous me faites confiance vous devriez le croire aussi ». Dire au monde entier que vous vous avez confiance en la clé de quelqu’un est appelé « Signer la clé de cette personne » : cela signifie que quiconque utilise cette clé peut voir que vous la cautionnez. Pour encourager les uns et les autres à vérifier et à signer leurs clés, les utilisateurs de PGP organisent des rencontres d’échange de signature de clés. Elles sont presque aussi palpitantes qu’elle semble l’être.Analogie : semblable à une rencontre de réseautage où vous présentez vos amis les uns aux autres.Synonymes : Échange de signature de clés.Source FFÉ. |
current | Adjective | actuel | ||
currently | ||||
curriculum for trainers | Noun | |||
custidoan | Noun | |||
custodian | Noun | [Globaleaks] | gardien | |
custom | Adjective | |||
customer support | Noun | assistance à la clientèle | Synonyme : soutien à la clientèle | |
customization | Noun | [Globaleaks] | personnalisation | |
customize | Verb | |||
cut | Verb | |||
daemon | Noun | [Tor] "A daemon is a computer program that runs as a background process, rather than being under the direct control of a user." (Source: Tor Glossary) | ||
darkweb | Noun | Internet invisible | ||
dashboard | Noun | |||
data | Noun | [Signal, Outline, Orbot]N’importe quelle sorte d’informations, habituellement stockées sous forme numérique. Les données peuvent inclure des documents, des images, des clés, des programmes, des messages et autres informations numériques ou fichiers.Source: FFE. | données | Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files.Source : FFÉ |
data package | Noun | paquet de données | ||
data retention | Noun | conservation des données | ||
data storage | Noun | magasin de données | ||
data-Driven Dropdown (Field) | Noun | [Martus] | champ déroulant guidé par les données | |
database | Noun | [Signal, CGIProxy] | base de données | |
datastore | Noun | http://en.wikipedia.org/wiki/Datastore_network | magasin de données | |
date range | Noun | plage de dates | ||
day | Noun | |||
deactivate | Verb | [Orbot] | ||
deanonymization | Noun | désanonymisation | ||
debit | ||||
debriefing | Noun | réunion-bilan | ||
debug | Verb | déboguer | ||
debug log | Noun | [Signal] | ||
debug mode | Noun | mode débogage | ||
debugging | Noun | débogage | ||
decentralized | Adjective | |||
deck | Noun | [Ooniprobe] This is a collection of ooniprobe tests and inputs. | jeu de mesure | |
decline | Verb | [Signal] To reject. As in "Decline an incoming call." | refuser | |
declined | Verb | |||
decompression | Noun | décompression | ||
decorating | ||||
decrypt | Verb | [Mailvelope] [Signal] [Orbot] Cryptography is the process of encryption and decryption of data. | déchiffrer | |
decrypted | Adjective | [Mailvelope] [Signal] | ||
decryption | Noun | [Mailvelope] [Orbot] | ||
dedicated server | Noun | [Globaleaks] | Serveur dédié | |
deductible | Adjective | déductible | ||
deepending | Adjective | |||
default | Adjective | [Globaleaks] [Signal] [Orbot] | par défaut | |
default | Noun | [Orbot] | valeur par défaut | Synonyme : par défaut. |
default server | Noun | serveur par défaut | ||
defenders | ||||
delay | Noun | retard | Souvent « retard , car « délai » signifie temps laissé pour faire quelque chose ou sursit. | |
delete | Verb | [Globaleaks] [Signal] | supprimer | |
deleted | Adjective | supprimé | ||
deletion | Noun | [Globaleaks] | ||
deprecated | Adjective | legacy' is something old still in use. 'deprecated' is something old that should not be used for now on. | déconseillé | Au sujet d’un programme ou fonction devenu obsolète et dont l’utilisation n’est plus recommandéeSynonyme : déprécié, désapprouvé. |
descriptor | Noun | Identification item for a file, a program or a data. | descripteur | Élément d’identification d’un fichier, d’un programme ou d’une donnée. |
deselect | Verb | dessélectionner | La graphie désélectionner ne respecte pas strictement les règles de la grammaire française puisque le verbe en question est formé avec le préfixe dé- qui s'écrit des- devant un mot commençant par un s suivi d'une voyelle, comme les verbes dessécher, desserrer, desservir. | |
desktop client | Noun | [Tor] | client pour ordinateur | |
desktop, desktop client | Noun | [Signal] | ||
destroy | Verb | Removes message/file from the entire Peerio server and all users' accounts | détruire | |
detached signature | ||||
detail | Noun | [Signal] | ||
detection | Noun | |||
deter | ||||
device | Noun | [Signal] [Orbot] | appareil | Autres acceptions : périphérique, dispositif |
dialog | Noun | |||
diceware | Noun | [KeePassXC] | méthode du lancer de dés | Méthode de sélection d’un mot de passe ou d’une phrase de passe qui consiste à lancer des dés et à en associer le résultat au mot correspondant dans une table préconstituée. |
digital | Adjective | numérique | ||
digital | Noun | |||
digital certificate | Noun | A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.Synonyms: Security certificate.Source EFF. | certificat numérique | Une façon de confirmer automatiquement qu’une clé publique est correcte (qu’elle est vraiment celle utilisée par une entité précise) afin de prévenir les attaques de l’intercepteur. Il est le plus souvent utilisé par les sites Web pour prouver à votre navigateur que vous avez une connexion sécurisée vers un vrai site et non quelque système qui manipulerait frauduleusement votre connexion,Synonyme : certificat de sécurité.Source FFÉ. |
digital signature | Noun | [Mailvelope]The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official version, and that nobody has tampered with it. They're also often used to confirm encrypted email has not been altered. When information isn't protected by a digital signature, an attacker could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Source EFF. | signature numérique | Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer qu’elle n’a pas été modifiée après écriture. Les signatures numériques peuvent être utilisées avec des téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle et que personne ne l’a manipulé. Elles sont aussi souvent utilisées pour confirmer que les courriels chiffrés n’ont pas été altérés. Si une information n’est pas protégée par une signature numérique, un assaillant pourrait modifier le contenu de ce quelqu’un a écrit ou publié, et il n’existerait aucun moyen technique de le détecter.Utilisation d’une technique mathématique pour confirmer l’origine d’une information et pour confirmer aussi qu’elle n’a pas été modifiée depuis qu’elle a été écrite. Les signatures numériques peuvent être utilisées avec les téléchargements de logiciels pour garantir que le logiciel que vous installez est identique à la version officielle publiée et que personne ne l’a manipulé frauduleusement. Elles sont aussi souvent utilisées pour le courriel chiffré et à de nombreuses autres fins. Si une information n’est pas protégée par une signature numérique, un fournisseur d’accès à Internet ou autre fournisseur de services de communication pourrait modifier le contenu de ce quelqu’un a écrit ou publié et il n’existerait aucun moyen technique de détecter ce qu’il s’est passé.Source FFÉ. |
directory | Noun | [Signal] | répertoire ou annuaire | Attention : ne pas confondre les deux acceptions |
directory authorities | Noun | It's a bit like a phone book kept by some servers. More info at https://jordan-wright.com/blog/2014/12/19/what-happens-if-tor-directory-authorities-are-seized/ | autorités d’annuaire | |
directory authority | Noun | [Tor] "A special-purpose relay that maintains a list of currently-running relays and periodically publishes a consensus together with the other directory authorities." (Source: Tor Glossary) | ||
disable | Verb | [Signal] [Orbot] | désactiver | |
disabled | ||||
disabled | Adjective | |||
disabled | Verb | |||
disappearing message | Noun | [Signal] | ||
discard | Verb | [Signal] | rejeter | |
disclaimer | Noun | |||
disconnect | Verb | [Signal, Outline] | déconnecter | |
discouraged | ||||
discussion | Noun | |||
disk | Noun | In most contexts in Martus, "disk" refers to any sort of removable storage device (USB, CD, floppy disk etc.) | ||
diversify | ||||
document | Noun | [Signal] | ||
domain | Noun | An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube. | domaine | |
domain name | Noun | The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF) | nom de domaine | L’adresse, sous forme de mots, d’un site Web ou d’un service Internet. Par exemple : ssd.eff.orgSource FFÉ. |
domain-fronting | Noun | utilisation de domaine-écran | ||
domestic violence survivors | ||||
domestic violence survivors | Noun | |||
donating | ||||
donating | Verb | |||
donation | Noun | don | ||
donation process | Noun | processus de don | ||
donations | Noun | |||
donor | Noun | donateur | ||
donor privacy policy | Noun | Politique de confidentialité relative aux donateurs | ||
download | Noun | [Globaleaks] | téléchargement | |
download | Verb | [Globaleaks] | télécharger | |
draft | Noun | |||
drag | Verb | glisser | ||
drive | Noun | |||
drop-down list | Noun | liste déroulante | ||
dual boot | Noun | dual boot | ||
ePub Reader | Noun | |||
eQualitie | Noun | Do not translate | eQualitie | Ne pas traduire |
eavesdropper | Noun | système d’écoute | ||
edit | Verb | modifier | ||
eepsite | Noun | site eep | ||
eligibility criteria | Noun | critères d'admissibilité | ||
Noun | [Outline] | courriel | Parfois « adresse courriel » selon le contexte. | |
Verb | envoyer par courriel | |||
email address | Noun | [Outline] | adresse courriel | |
email identity (e-mail identity) | Noun | Synonym: e-mail identity | identité de courriel | |
email list | Noun | liste de diffusion | ||
email provider | Noun | service de courriel | ||
email, e-mail | Noun | [Outline] Synonym: e-mail | courriel | |
embedded | Adjective | intégré |