Persian Localization Lab Unified Glossary: Difference between revisions

From Localization Lab Wiki
Jump to navigation Jump to search
(Added Persian Glossary)
 
(Added Persian Glossary)
Line 1: Line 1:
   Browse or search the glossary below using ctrl / command + f. A downloadable version of this glossary is available in [Google Drive]. Feel free to add comments to the Google Drive version of the glossary or add comments to the wiki if you have suggestions or disagree with translations.
   Browse or search the glossary below using ctrl / command + f. A downloadable version of this glossary is available in [Google Drive]. Feel free to add comments to the Google Drive version of the glossary or add comments to the wiki if you have suggestions or disagree with translations.


{|
{| class="wikitable sortable" style="border:1px solid #BBB" style="font-size:75%"
! term || pos || comment || translation_fa || comment_fa
! term || pos || comment || translation_fa || comment_fa
|-
|-
Line 42: Line 42:
| Account Recovery Code || Noun ||  ||  ||  
| Account Recovery Code || Noun ||  ||  ||  
|-
|-
| Anti Evil Maid || Noun || [Qubes OS] Do not translate.
| Anti Evil Maid || Noun || [Qubes OS] Do not translate.<br>Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. <br>Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html ||  ||
|-
|-
| Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. <br>Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html
| Antivirus || Noun || Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.<br>Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software. <br>Source EFF." || آنتی‌ویروس ||  
|-
| Antivirus || Noun || Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.
|-
| Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person ||  rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.
|-
| Source EFF." || آنتی‌ویروس ||  
|-
|-
| AppVM || Noun || [Qubes OS] "Application Virtual Machine"A VM which is intended for running software applications. ||  ||  
| AppVM || Noun || [Qubes OS] "Application Virtual Machine"A VM which is intended for running software applications. ||  ||  
|-
|-
| Asset || Noun || In threat modeling, any piece of data or a device that needs to be protected.
| Asset || Noun || In threat modeling, any piece of data or a device that needs to be protected.<br>Source EFF." ||  ||  
|-
| Source EFF." ||  ||  
|-
| Asymmetric-key encryption || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
|-
| Synonyms: Public key encryption ||  Public key cryptography.
|-
|-
| Source EFF." ||  ||  
| Asymmetric-key encryption || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.<br>Synonyms: Public key encryption, Public key cryptography.<br>Source EFF ||  ||  
|-
|-
| Attach || Verb || To attach a file to a message ||  ||  
| Attach || Verb || To attach a file to a message ||  ||  
|-
|-
| Attack || Noun || In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."
| Attack || Noun || In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."<br>Source EFF." ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Attacker || Noun ||  ||  ||  
| Attacker || Noun ||  ||  ||  
Line 100: Line 86:
| Browse || Verb || [Globaleaks] ||  ||  
| Browse || Verb || [Globaleaks] ||  ||  
|-
|-
| Browser fingerprint || Noun || The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.
| Browser fingerprint || Noun || The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.<br>Source EFF. ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Buffer || Noun ||  ||  ||  
| Buffer || Noun ||  ||  ||  
Line 108: Line 92:
| Built || Verb ||  ||  ||  
| Built || Verb ||  ||  ||  
|-
|-
| Burner phone || Noun || A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.
| Burner phone || Noun || A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.<br>Synonyms: Throwaway<br>Source EFF. ||  ||  
|-
| Synonyms: Throwaway
|-
| Source EFF." ||  ||
|-
| C&amp;C || Noun || A command and control server (C&amp;C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.
|-
| Synonyms: Command and control server ||  C2.
|-
| Source EFF." ||  ||  
|-
| C2 || Noun || A command and control server (C&amp;C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.
|-
|-
| Synonyms: Command and control server ||  C2.
| C&C || Noun || A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.<br>Synonyms: Command and control server, C2.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||  
| C2 || Noun || A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.<br>Synonyms: Command and control server, C2.<br>Source EFF ||  ||  
|-
|-
| CPU || Noun ||  ||  ||  
| CPU || Noun ||  ||  ||  
Line 136: Line 108:
| Calendar || Noun ||  ||  ||  
| Calendar || Noun ||  ||  ||  
|-
|-
| Capability || Noun || The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
| Capability || Noun || The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Car documents || Noun || [Umbrella] ||  ||  
| Car documents || Noun || [Umbrella] ||  ||  
Line 178: Line 148:
| Column || Noun ||  || ردیف ||  
| Column || Noun ||  || ردیف ||  
|-
|-
| Command and control server || Noun || A command and control server (C&amp;C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.
| Command and control server || Noun || A command and control server (C&amp;C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&amp;C servers control millions of devices.<br>Synonyms: C&amp;C, C2.<br>Source EFF ||  ||  
|-
| Synonyms: C&amp;C ||  C2.
|-
| Source EFF." ||  ||
|-
| Command line tool || Noun || The "command line" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the responses don't match your expectations.
|-
| Source EFF." || ابزار خط فرمان ||  
|-
|-
| Commercial VPN || Noun || A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, or untrusted local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The down side is that most of the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to snoop on your traffic.
| Command line tool || Noun || The "command line" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the responses don't match your expectations.<br>Source EFF." || ابزار خط فرمان ||
|-
|-
| Source EFF." ||  ||  
| Commercial VPN || Noun || A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, or untrusted local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The down side is that most of the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to snoop on your traffic.<br>Source EFF ||  ||  
|-
|-
| Commit || Noun ||  ||  ||  
| Commit || Noun ||  ||  ||  
Line 216: Line 178:
| Cookies || Noun ||  ||  ||  
| Cookies || Noun ||  ||  ||  
|-
|-
| Corporate Intranet || Noun || Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.
| Corporate Intranet || Noun || Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Courier || Noun ||  ||  ||  
| Courier || Noun ||  ||  ||  
Line 232: Line 192:
| Cryptocurrency || Noun ||  ||  ||  
| Cryptocurrency || Noun ||  ||  ||  
|-
|-
| Cryptographic signature || Noun || The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
| Cryptographic signature || Noun || The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.<br>Synonyms: digital Signature<br>Source EFF." ||  ||  
|-
| Synonyms: digital Signature
|-
| Source EFF." ||  ||  
|-
| Cryptography || Noun || The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.
|-
| Source EFF." ||  ||
|-
| Cryptoparty || Noun || When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
|-
| Analogy: It's like a networking party ||  where you introduce your friends to other friends.
|-
|-
| Synonyms: key-signing party.
| Cryptography || Noun || The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||  
| Cryptoparty || Noun || When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.<br>Analogy: It's like a networking party, where you introduce your friends to other friends.<br>Synonyms: key-signing party.<br>Source EFF ||  ||  
|-
|-
| Current || Adjective ||  ||  ||  
| Current || Adjective ||  ||  ||  
Line 262: Line 210:
| DD || Noun ||  ||  ||  
| DD || Noun ||  ||  ||  
|-
|-
| DDoS || Noun || A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
| DDoS || Noun || A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.<br>Synonyms: Distributed Denial of Service attack.<br>Source EFF." ||  ||  
|-
| Synonyms: Distributed Denial of Service attack.
|-
| Source EFF." ||  ||  
|-
|-
| DHT || Noun ||  ||  ||  
| DHT || Noun ||  ||  ||  
Line 316: Line 260:
| Digital || Adjective ||  ||  ||  
| Digital || Adjective ||  ||  ||  
|-
|-
| Digital Signature || Noun || The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
| Digital Signature || Noun || The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.<br>Synonyms: cryptographic signature.<br>Source EFF ||  ||  
|-
| Synonyms: cryptographic signature.
|-
| Source EFF." ||  ||  
|-
| Digital certificate || Noun || A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
|-
|-
| Synonyms: Security certificate.
| Digital certificate || Noun || A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.<br>Synonyms: Security certificate.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Directory || Noun ||  ||  ||  
| Directory || Noun ||  ||  ||  
Line 342: Line 278:
| Distributed || Verb ||  ||  ||  
| Distributed || Verb ||  ||  ||  
|-
|-
| Distributed denial of service attack || Noun || A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
| Distributed denial of service attack || Noun || A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.<br>Synonyms: DDoS.<br>Source EFF ||  ||  
|-
| Synonyms: DDoS.
|-
| Source EFF." ||  ||  
|-
|-
| Distribution || Noun ||  || توزیع ||  
| Distribution || Noun ||  || توزیع ||  
Line 356: Line 288:
| DomU || Noun || [QubesOS] "Unprivileged Domain"Also known as **guest** domains, domUs are the counterparts to dom0. ||  ||  
| DomU || Noun || [QubesOS] "Unprivileged Domain"Also known as **guest** domains, domUs are the counterparts to dom0. ||  ||  
|-
|-
| Domain name || Noun || The address, in words, of a website or Internet service; for example: ssd.eff.org
| Domain name || Noun || The address, in words, of a website or Internet service; for example: ssd.eff.org<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Download || Verb || [Globaleaks] ||  ||  
| Download || Verb || [Globaleaks] ||  ||  
Line 392: Line 322:
| Encryption ||  ||  ||  ||  
| Encryption ||  ||  ||  ||  
|-
|-
| Encryption || Noun || A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form.
| Encryption || Noun || A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form.<br>Source EFF.<br>[Globaleaks] ||  ||  
|-
| Source EFF.
|-
| [Globaleaks]" ||  ||  
|-
| Encryption key || Noun || An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different.
|-
| Source EFF.
|-
|-
| [Globaleaks]" ||  ||  
| Encryption key || Noun || An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different.<br>Source EFF.<br>[Globaleaks] ||  ||  
|-
|-
| Ensure || Verb ||  ||  ||  
| Ensure || Verb ||  ||  ||  
Line 412: Line 334:
| Expiry || Noun ||  ||  ||  
| Expiry || Noun ||  ||  ||  
|-
|-
| Extension || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
| Extension || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.<br>Synonyms: Add-on, Plugin.<br>Source EFF ||  ||  
|-
| Synonyms: Add-on ||  Plugin.
|-
| Source EFF" ||  ||  
|-
|-
| External drive || Noun ||  ||  ||  
| External drive || Noun ||  ||  ||  
Line 428: Line 346:
| FOSS || Noun || Free and open-source software ||  ||  
| FOSS || Noun || Free and open-source software ||  ||  
|-
|-
| FTP server || Noun || An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
| FTP server || Noun || An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.<br>Synonyms: FTP server, File Transfer Protocol<br>Source EFF ||  ||  
|-
| Synonyms: FTP server ||  File Transfer Protocol.
|-
| Source EFF." ||  ||  
|-
|-
| Fallback || Adjective || [Globaleaks] ||  ||  
| Fallback || Adjective || [Globaleaks] ||  ||  
Line 450: Line 364:
| File || Noun || [Globaleaks] ||  ||  
| File || Noun || [Globaleaks] ||  ||  
|-
|-
| File Transfer Protocol || Noun || An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
| File Transfer Protocol || Noun || An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.<br>Synonyms: FTP server, File Transfer Protocol.<br>Source EFF. ||  ||  
|-
| Synonyms: FTP server ||  File Transfer Protocol.
|-
| Source EFF.
|-
| ,,
|-
| File fingerprint || Noun || A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
|-
| Synonyms: file hash value.
|-
| Source EFF." ||  ||  
|-
| File hash value || Noun || A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
|-
| Synonyms: File fingerprint.
|-
|-
| Source EFF." ||  ||  
| File fingerprint || Noun || A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.<br>Synonyms: file hash value.<br>Source EFF ||  ||  
|-
|-
| File system || Noun || Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.
| File hash value || Noun || A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.<br>Synonyms: File fingerprint.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||  
| File system || Noun || Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.<br>Source EFF ||  ||  
|-
|-
| Firefox || Noun ||  ||  ||  
| Firefox || Noun ||  ||  ||  
|-
|-
| Firewall || Noun || A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways.
| Firewall || Noun || A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| FirewallVM || Noun || "Firewall Virtual Machine"A type of ProxyVM which is used to enforce network-level policies (a.k.a. "firewall rules"). ||  ||  
| FirewallVM || Noun || "Firewall Virtual Machine"A type of ProxyVM which is used to enforce network-level policies (a.k.a. "firewall rules"). ||  ||  
Line 496: Line 392:
| Forum || Noun ||  ||  ||  
| Forum || Noun ||  ||  ||  
|-
|-
| Forward Secrecy || Noun || A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
| Forward Secrecy || Noun || A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.<br>Synonyms: Perfect forward secrecy.<br>Source EFF. ||  ||  
|-
| Synonyms: Perfect forward secrecy.
|-
| Source EFF." ||  ||  
|-
|-
| Freedom || Noun ||  ||  ||  
| Freedom || Noun ||  ||  ||  
Line 506: Line 398:
| Frequently Asked Questions || Noun || “FAQ” ||  ||  
| Frequently Asked Questions || Noun || “FAQ” ||  ||  
|-
|-
| Full disk encryption || Noun || If you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.
| Full disk encryption || Noun || If you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Functionalities || Noun ||  ||  ||  
| Functionalities || Noun ||  ||  ||  
Line 576: Line 466:
| HTTP Invalid Request Line || Noun ||  ||  ||  
| HTTP Invalid Request Line || Noun ||  ||  ||  
|-
|-
| HTTPS || Noun || If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes.
| HTTPS || Noun || If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes.<br>Source EFF. ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| HTTPS Everywhere || Noun ||  || HTTPS در همه جا ||  
| HTTPS Everywhere || Noun ||  || HTTPS در همه جا ||  
Line 632: Line 520:
| IDE || Noun ||  ||  ||  
| IDE || Noun ||  ||  ||  
|-
|-
| IMAP settings || Noun || IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.
| IMAP settings || Noun || IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.<br>Source EFF. ||  ||  
|-
| Source EFF." ||  ||  
|-
| IP address || Noun || A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online.
|-
|-
| Source EFF." || آدرس IP ||  
| IP address || Noun || A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online.<br>Source EFF. || آدرس IP ||  
|-
|-
| ISP || Noun || “Internet Service Provider ||  ||  
| ISP || Noun || “Internet Service Provider ||  ||  
|-
|-
| Identicon || Noun || A computer generated visual icon used as an alternative digital fingerprint. aka "identicon".
| Identicon || Noun || A computer generated visual icon used as an alternative digital fingerprint. aka "identicon".<br>Synonym: avatar ||  ||  
|-
| Synonym: avatar" ||  ||  
|-
|-
| Immediate || Adjective ||  ||  ||  
| Immediate || Adjective ||  ||  ||  
Line 654: Line 536:
| Include Private Data || Verb ||  ||  ||  
| Include Private Data || Verb ||  ||  ||  
|-
|-
| Indicators of compromise || Noun || Clues that show that your device may have been broken into or tampered with.
| Indicators of compromise || Noun || Clues that show that your device may have been broken into or tampered with.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Internet || Noun ||  || اینترنت ||  
| Internet || Noun ||  || اینترنت ||  
Line 662: Line 542:
| Internet Service Provider || Noun || ISP || ارائه دهنده خدمات اینترنتی || ISP
| Internet Service Provider || Noun || ISP || ارائه دهنده خدمات اینترنتی || ISP
|-
|-
| Internet filtering || Noun || Filtering is the politer term for blocking or censoring Internet traffic.
| Internet filtering || Noun || Filtering is the politer term for blocking or censoring Internet traffic.<br>Synonyms: blocking.<br>Source EFF. ||  ||  
|-
| Synonyms: blocking.
|-
| Source EFF." ||  ||  
|-
|-
| Introduce || Verb ||  ||  ||  
| Introduce || Verb ||  ||  ||  
Line 692: Line 568:
| Key Exchange || Noun ||  ||  ||  
| Key Exchange || Noun ||  ||  ||  
|-
|-
| Key fingerprint || Noun || A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.
| Key fingerprint || Noun || A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.<br>Source EFF. ||  ||
|-
|-
| Source EFF." ||  ||  
| Key verification || Noun || In public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.<br>Source EFF." ||  ||  
|-
|-
| Key verification || Noun || In public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.
| Key-signing party || Noun || When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.<br>Analogy: It's like a networking party, where you introduce your friends to other friends.<br>Synonyms: cryptoparty.<br>Source EFF. ||  ||
|-
|-
| Source EFF." ||  ||  
| Keyboard || Noun ||  || صفحه کلید ||  
|-
|-
| Key-signing party || Noun || When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
| Keyboard Layout || Noun || ||  ||
|-
|-
| Analogy: It's like a networking party ||  where you introduce your friends to other friends.
| Keylogger || Noun || A malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.<br>Source EFF. ||  ||  
|-
| Synonyms: cryptoparty.
|-
| Source EFF." ||  ||
|-
| Keyboard || Noun ||  || صفحه کلید ||
|-
| Keyboard Layout || Noun ||  ||  ||
|-
| Keylogger || Noun || A malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.
|-
| Source EFF." ||  ||  
|-
|-
| Label || Noun || [Globaleaks] ||  ||  
| Label || Noun || [Globaleaks] ||  ||  
Line 774: Line 638:
| Logs || Noun ||  ||  ||  
| Logs || Noun ||  ||  ||  
|-
|-
| MBR || Noun ||  || MBR || Master Boot Record, MBR
| MBR || Noun || MBR, Master Boot Record, MBR || مستر بوت رکورد، MBR" ||  
|-
| مستر بوت رکورد، MBR"
|-
| MITM || Noun || Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
|-
| Synonyms: Man-in-the-middle attack.
|-
|-
| Source EFF." ||  ||  
| MITM || Noun || Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.<br>Synonyms: Man-in-the-middle attack.<br>Source EFF. ||  ||  
|-
|-
| MM || Noun ||  ||  ||  
| MM || Noun ||  ||  ||  
Line 798: Line 656:
| Malicious || Adjective ||  ||  ||  
| Malicious || Adjective ||  ||  ||  
|-
|-
| Malicious software || Noun || Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
| Malicious software || Noun || Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.<br>Synonyms: Malware.<br>Source EFF. ||  ||  
|-
| Synonyms: Malware.
|-
| Source EFF." ||  ||  
|-
| Malware || Noun || Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
|-
| Synonyms: Malicious software
|-
| Source EFF." ||  ||
|-
| Man-in-the-middle attack || Noun || Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
|-
|-
| Synonyms: MITM
| Malware || Noun || Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.<br>Synonyms: Malicious software<br>Source EFF. ||  ||
|-
|-
| Source EFF." ||  ||  
| Man-in-the-middle attack || Noun || Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.<br>Synonyms: MITM<br>Source EFF. ||  ||  
|-
|-
| Manage Contacts || Noun || [Martus] Martus menu option. || مدیریت مخاطبان ||  
| Manage Contacts || Noun || [Martus] Martus menu option. || مدیریت مخاطبان ||  
Line 832: Line 678:
| Master Boot Record, MBR || Noun ||  || مستر بوت رکورد، MBR ||  
| Master Boot Record, MBR || Noun ||  || مستر بوت رکورد، MBR ||  
|-
|-
| Master password || Noun || A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.
| Master password || Noun || A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.<br>Source EFF. ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Matching || Adjective || [Globaleaks] ||  ||  
| Matching || Adjective || [Globaleaks] ||  ||  
Line 896: Line 740:
| OS || Noun || Operating system ||  ||  
| OS || Noun || Operating system ||  ||  
|-
|-
| OTR || Noun || Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.
| OTR || Noun || Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.<br>The OTR cryptographic protocol provides strong encryption for instant messaging conversations.<br>Synonyms : Off-the-Record<br>Source EFF ||  ||  
|-
| The OTR cryptographic protocol provides strong encryption for instant messaging conversations.
|-
| Synonyms : Off-the-Record
|-
| Source EFF." ||  ||  
|-
|-
| Observatory || Noun ||  || رصد خانه ||  
| Observatory || Noun ||  || رصد خانه ||  
Line 908: Line 746:
| Off || Adjective ||  ||  ||  
| Off || Adjective ||  ||  ||  
|-
|-
| Off-the-Record || Noun || Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.
| Off-the-Record || Noun || Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.<br>The OTR cryptographic protocol provides strong encryption for instant messaging conversations.<br>Synonyms : OTR.<br>Source EFF. ||  ||  
|-
| The OTR cryptographic protocol provides strong encryption for instant messaging conversations.
|-
| Synonyms : OTR.
|-
| Source EFF." ||  ||  
|-
| One-time password || Noun || Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
|-
|-
| Source EFF." ||  ||  
| One-time password || Noun || Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.<br>Source EFF ||  ||  
|-
|-
| Onion || Noun || [Tor] ||  ||  
| Onion || Noun || [Tor] ||  ||  
Line 930: Line 760:
| Onion routing || Noun || [Tor] ||  ||  
| Onion routing || Noun || [Tor] ||  ||  
|-
|-
| Open-source software || Noun || Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.
| Open-source software || Noun || Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.<br>Synonyms: FLOSS, free, libre and open-source software, free software<br>Source EFF ||  ||  
|-
| Synonyms: FLOSS ||  free ||  libre and open-source software ||  free software
|-
| Source EFF." ||  ||  
|-
|-
| OpenPGP || Noun || OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy) ||  ||  
| OpenPGP || Noun || OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy) ||  ||  
Line 940: Line 766:
| OpenPGP key || Noun ||  || کلید OpenPGP ||  
| OpenPGP key || Noun ||  || کلید OpenPGP ||  
|-
|-
| Operating system || Noun || A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems.
| Operating system || Noun || A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems.<br>Source EFF.<br>Synonym: OS ||  ||  
|-
| Source EFF.
|-
| Synonym: OS" ||  ||  
|-
|-
| Optional Setup || Noun ||  ||  ||  
| Optional Setup || Noun ||  ||  ||  
Line 952: Line 774:
| Orbot || Noun ||  ||  ||  
| Orbot || Noun ||  ||  ||  
|-
|-
| Out-of-band verification || Noun || "Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.
| Out-of-band verification || Noun || "Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.<br>Synonyms: out-of-band<br>Source EFF ||  ||  
|-
| Synonyms: out-of-band
|-
| Source EFF." ||  ||  
|-
|-
| Overhead || Noun ||  ||  ||  
| Overhead || Noun ||  ||  ||  
Line 966: Line 784:
| PDFs || Noun ||  ||  ||  
| PDFs || Noun ||  ||  ||  
|-
|-
| PGP || Noun || PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
| PGP || Noun || PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.<br>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message,” even if they are using GnuPG.<br>Synonyms: Pretty Good Privacy.<br>Source EFF. ||  ||
|-
|-
| PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach ||  people will refer to using a “PGP key” or sending a “PGP message” ||  even if they are using GnuPG.
| PV || Noun || [QubesOS] "Paravirtualization"An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms. ||  ||  
|-
| Synonyms: Pretty Good Privacy.
|-
| Source EFF.
|-
| ,,
|-
| PV || Noun || [QubesOS] "Paravirtualization"An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms. ||  ||  
|-
|-
| PVHVM || Noun || [QubesOS] "Paravirtualization on Hardware Virtual Machine"To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers). ||  ||  
| PVHVM || Noun || [QubesOS] "Paravirtualization on Hardware Virtual Machine"To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers). ||  ||  
Line 988: Line 798:
| Panic || Noun || Panic button, panic app ||  ||  
| Panic || Noun || Panic button, panic app ||  ||  
|-
|-
| Passive adversary || Noun || A passive adversary is one that can listen to your communications, but cannot directly tamper with them.
| Passive adversary || Noun || A passive adversary is one that can listen to your communications, but cannot directly tamper with them.<br>Source EFF. ||  ||  
|-
| Source EFF." ||  ||  
|-
| Password manager || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
|-
| Synonyms: Secure password database; password safe.
|-
| Source EFF.
|-
| ,,
|-
| Password safe || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
|-
|-
| Synonyms: Secure password database ||  Password manager.
| Password manager || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.<br>Synonyms: Secure password database; password safe.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||  
| Password safe || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.<br>Synonyms: Secure password database, Password manager.<br>Source EFF ||  ||  
|-
|-
| Payload || Noun ||  ||  ||  
| Payload || Noun ||  ||  ||  
Line 1,010: Line 808:
| Peer-to-Peer  || Adjective ||  ||  ||  
| Peer-to-Peer  || Adjective ||  ||  ||  
|-
|-
| Perfect forward secrecy || Noun || A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
| Perfect forward secrecy || Noun || A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.<br>Synonyms: Forward secrecy.<br>Source EFF ||  ||  
|-
| Synonyms: Forward secrecy.
|-
| Source EFF." ||  ||  
|-
|-
| Persistence wizard || Noun ||  || جادوگر تداوم ||  
| Persistence wizard || Noun ||  || جادوگر تداوم ||  
Line 1,044: Line 838:
| Pluggable Transports Bundle || Noun ||  || نردبان حمل و نقل بسته نرم افزاری ||  
| Pluggable Transports Bundle || Noun ||  || نردبان حمل و نقل بسته نرم افزاری ||  
|-
|-
| Plugin || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
| Plugin || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.<br>Synonyms: add-on, extension.<br>Source EFF ||  ||  
|-
| Synonyms: add-on ||  extension.
|-
| Source EFF." ||  ||  
|-
|-
| Ponte ||  ||  ||  ||  
| Ponte ||  ||  ||  ||  
Line 1,072: Line 862:
| Preparation || Noun ||  ||  ||  
| Preparation || Noun ||  ||  ||  
|-
|-
| Pretty Good Privacy || Noun || PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
| Pretty Good Privacy || Noun || PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.<br>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message,” even if they are using GnuPG.<br>Synonyms: PGP.<br>Source EFF ||  ||  
|-
| PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach ||  people will refer to using a “PGP key” or sending a “PGP message” ||  even if they are using GnuPG.
|-
| Synonyms: PGP.
|-
| Source EFF." ||  ||  
|-
|-
| Preview || Verb ||  ||  ||  
| Preview || Verb ||  ||  ||  
Line 1,088: Line 872:
| Projects || Noun ||  ||  ||  
| Projects || Noun ||  ||  ||  
|-
|-
| Protocol || Noun || A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging.
| Protocol || Noun || A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| ProxyVM || Noun || [QubesOS] "Proxy Virtual Machine"A type of VM which proxies network access for other VMs ||  ||  
| ProxyVM || Noun || [QubesOS] "Proxy Virtual Machine"A type of VM which proxies network access for other VMs ||  ||  
|-
|-
| Pseudonym || Noun || A name that you choose to use in some context (like an online forum) and that others may come to recognize, but that isn’t connected to names that people know you by in your day-to-day life.
| Pseudonym || Noun || A name that you choose to use in some context (like an online forum) and that others may come to recognize, but that isn’t connected to names that people know you by in your day-to-day life.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Psiphon || Noun || Name of the organization and tool. Please do not translate this term. If needed, you can transcribe the organization / tool name. For example, the name is transcribed in Arabic, Persian and Amharic. ||  ||  
| Psiphon || Noun || Name of the organization and tool. Please do not translate this term. If needed, you can transcribe the organization / tool name. For example, the name is transcribed in Arabic, Persian and Amharic. ||  ||  
Line 1,104: Line 884:
| Public Information File (*.mpi) || Noun || Files containing the account's public information ||  ||  
| Public Information File (*.mpi) || Noun || Files containing the account's public information ||  ||  
|-
|-
| Public key cryptography || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
| Public key cryptography || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.<br>Synonyms: Public key encryption, Public key cryptography.<br>Source EFF ||  ||  
|-
| Synonyms: Public key encryption ||  Public key cryptography.
|-
| Source EFF." ||  ||
|-
| Public key encryption || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
|-
| Synonyms: Asymmetric key encryption ||  Public key cryptography.
|-
| Source EFF." ||  ||
|-
| Public key servers || Noun || If you plan to send a secure message to someone who uses public key cryptography like PGP, you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such keys, allowing software to use an email address, name, or key fingerprint to search for a full key and download it. There are many PGP public key servers, but they usually share their key collections with each other. Keyservers can't verify whether the keys they publish are genuine or forgeries. Anyone can upload a key to a public key server—in anyone's name. That means that a key connected to a person's name or email on a keyserver might not be their real key. In order to check the authenticity of a key, you need to check its signatures, or confirm its fingerprint with the original user in a trustworthy way.
|-
|  
|-
|-
| PGP allows you to sign other people's keys || which is a way of using your own key to assert that a certain key is the right one to use to contact another person. This is meant to provide a way of distinguishing between genuine and fake keys; if people sign the right keys for people they know and communicate with ||  others can use those signatures to confirm that the genuine keys are genuine. When you download a key from a key server ||  it may include signatures from other people who affirm that it's the right one. If you know those people and know that you have the right key for them ||  you can have more confidence in the newly downloaded key. This verification process is also called the web of trust. Its advantage is that it's decentralized and not controlled by any authority ||  so you don't have to believe a certain company or government about which keys to use when writing to new people. Instead ||  you can believe your own social networks. One important disadvantage of the web of trust is that publishing signatures for other people's keys tells the whole world who your contacts are; it creates public evidence that you know particular people. Also ||  using the web of trust correctly requires a good deal of  time and attention || and some communities rarely or never participate.
| Public key encryption || Noun || Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.<br>Synonyms: Asymmetric key encryption, Public key cryptography.<br>Source EFF ||  ||  
|-
|-
| Source EFF." ||  ||  
| Public key servers || Noun || If you plan to send a secure message to someone who uses public key cryptography like PGP, you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such keys, allowing software to use an email address, name, or key fingerprint to search for a full key and download it. There are many PGP public key servers, but they usually share their key collections with each other. Keyservers can't verify whether the keys they publish are genuine or forgeries. Anyone can upload a key to a public key server—in anyone's name. That means that a key connected to a person's name or email on a keyserver might not be their real key. In order to check the authenticity of a key, you need to check its signatures, or confirm its fingerprint with the original user in a trustworthy way.<br>PGP allows you to sign other people's keys, which is a way of using your own key to assert that a certain key is the right one to use to contact another person. This is meant to provide a way of distinguishing between genuine and fake keys; if people sign the right keys for people they know and communicate with, others can use those signatures to confirm that the genuine keys are genuine. When you download a key from a key server, it may include signatures from other people who affirm that it's the right one. If you know those people and know that you have the right key for them, you can have more confidence in the newly downloaded key. This verification process is also called the web of trust. Its advantage is that it's decentralized and not controlled by any authority, so you don't have to believe a certain company or government about which keys to use when writing to new people. Instead, you can believe your own social networks. One important disadvantage of the web of trust is that publishing signatures for other people's keys tells the whole world who your contacts are; it creates public evidence that you know particular people. Also, using the web of trust correctly requires a good deal of  time and attention, and some communities rarely or never participate.<br>Source EFF ||  ||  
|-
|-
| Q&amp;A || Noun ||  ||  ||  
| Q&A || Noun ||  ||  ||  
|-
|-
| QR Code || Noun ||  ||  ||  
| QR Code || Noun ||  ||  ||  
Line 1,214: Line 980:
| Reusable Choice || Noun ||  || گزینه قابل استفاده ||  
| Reusable Choice || Noun ||  || گزینه قابل استفاده ||  
|-
|-
| Revocation certificate || Noun || What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.
| Revocation certificate || Noun || What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Rich Text || Noun ||  ||  ||  
| Rich Text || Noun ||  ||  ||  
Line 1,226: Line 990:
| Rip || Verb ||  ||  ||  
| Rip || Verb ||  ||  ||  
|-
|-
| Risk analysis || Noun || In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
| Risk analysis || Noun || In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.<br>Synonyms: Risk, Risk Assessment.<br>Source EFF ||  ||  
|-
| Synonyms: Risk ||  Risk Assessment.
|-
| Source EFF." ||  ||  
|-
| Risk assessment || Noun || In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
|-
|-
| Synonyms: Risk ||  Risk analysis.
| Risk assessment || Noun || In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.<br>Synonyms: Risk, Risk analysis.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Roadmap || Noun ||  ||  ||  
| Roadmap || Noun ||  ||  ||  
Line 1,258: Line 1,014:
| SD card || Noun ||  ||  ||  
| SD card || Noun ||  ||  ||  
|-
|-
| SIM card || Noun || A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.
| SIM card || Noun || A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| SMS || Noun || Synonym: text message ||  ||  
| SMS || Noun || Synonym: text message ||  ||  
Line 1,268: Line 1,022:
| SSD (Solid-State Drive) || Noun || "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive ||  ||  
| SSD (Solid-State Drive) || Noun || "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive ||  ||  
|-
|-
| SSH || Noun || SSH (or Secure Shell) is a method for letting you securely control a remote computer via a command line interface. One of the features of the SSH protocol is that as well as sending commands, you can also use it to securely relay Internet traffic between two computers. To set up an ssh link, the remote system needs to operate as a ssh server, and your local machine need an ssh client program.
| SSH || Noun || SSH (or Secure Shell) is a method for letting you securely control a remote computer via a command line interface. One of the features of the SSH protocol is that as well as sending commands, you can also use it to securely relay Internet traffic between two computers. To set up an ssh link, the remote system needs to operate as a ssh server, and your local machine need an ssh client program.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| SSL Observatory || Noun ||  || رصدخانه SSL ||  
| SSL Observatory || Noun ||  || رصدخانه SSL ||  
Line 1,294: Line 1,046:
| Secure || Verb ||  ||  ||  
| Secure || Verb ||  ||  ||  
|-
|-
| Secure Sockets Layer (SSL) || Noun || The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
| Secure Sockets Layer (SSL) || Noun || The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).<br>Synonyms: Transport layer security.<br>Source EFF. ||  ||
|-
| Synonyms: Transport layer security.
|-
| Source EFF.
|-
|-
| ,,
| Secure password database || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.<br>Synonyms: Password manager, password safe.<br>Source EFF ||  ||
|-
|-
| Secure password database || Noun || A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
| Security certificate || Noun || A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.<br>Synonyms: Digital certificate.<br>Source EFF ||  ||
|-
|-
| Synonyms: Password manager ||  password safe.
| Security question || Noun || To supplement passwords, some systems use "security questions." These are queries to which only you are supposed to know the answer. The problem with security questions is that they are really just extra passwords that have potentially guessable or discoverable answers. We recommend you treat them as any other password: create a long, novel, random, phrase to answer them, and record that somewhere safe. So the next time your bank asks you your mother's maiden name, you should be ready to answer "Correct Battery Horse Staple" or similar.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||
|-
| Security certificate || Noun || A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
|-
| Synonyms: Digital certificate.
|-
| Source EFF." ||  ||
|-
| Security question || Noun || To supplement passwords, some systems use "security questions." These are queries to which only you are supposed to know the answer. The problem with security questions is that they are really just extra passwords that have potentially guessable or discoverable answers. We recommend you treat them as any other password: create a long, novel, random, phrase to answer them, and record that somewhere safe. So the next time your bank asks you your mother's maiden name, you should be ready to answer "Correct Battery Horse Staple" or similar.
|-
| Source EFF." ||  ||  
|-
|-
| Security token || Noun ||  ||  ||  
| Security token || Noun ||  ||  ||  
Line 1,358: Line 1,094:
| Software || Noun || [Globaleaks] ||  ||  
| Software || Noun || [Globaleaks] ||  ||  
|-
|-
| Solid State Drive || Noun || Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.
| Solid State Drive || Noun || Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.<br>Synonyms: SSD.<br>Source EFF ||  ||  
|-
| Synonyms: SSD.
|-
| Source EFF." ||  ||  
|-
|-
| Source || Noun || [Globaleaks] ||  ||  
| Source || Noun || [Globaleaks] ||  ||  
Line 1,422: Line 1,154:
| This browser || Noun ||  ||  ||  
| This browser || Noun ||  ||  ||  
|-
|-
| Threat || Noun || In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded).
| Threat || Noun || In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded).<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
| Threat model || Noun || A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.
|-
| Synonyms: Threat modeling.
|-
|-
| Source EFF." ||  ||  
| Threat model || Noun || A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.<br>Synonyms: Threat modeling.<br>Source EFF ||  ||  
|-
|-
| Threat modeling || Noun || A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.
| Threat modeling || Noun || A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.<br>Synonyms: Threat model.<br>Source EFF ||  ||
|-
|-
| Synonyms: Threat model.
| Throwaway || Noun || A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.<br>Synonyms: Burner phone<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||
| Throwaway address || Noun || An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.<br>Source EFF ||  ||  
|-
| Throwaway || Noun || A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.
|-
| Synonyms: Burner phone
|-
| Source EFF." ||  ||
|-
| Throwaway address || Noun || An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
|-
| Source EFF." ||  ||  
|-
|-
| Tip || Noun || [Globaleaks] ||  ||  
| Tip || Noun || [Globaleaks] ||  ||  
Line 1,474: Line 1,190:
| Traffic || Noun || [Globaleaks] ||  ||  
| Traffic || Noun || [Globaleaks] ||  ||  
|-
|-
| Traffic-blocking browser extension || Noun || When you visit a website, your browser sends some information to that site's operators -- your IP address, other information about your computer, and cookies that link you to previous visits using that browser, for instance. If the website includes images and content taken from other web servers, that same information is sent to other websites as part of downloading or viewing the page. Advertising networks, analytics providers, and other data collectors may gather information from you in this way.
| Traffic-blocking browser extension || Noun || When you visit a website, your browser sends some information to that site's operators -- your IP address, other information about your computer, and cookies that link you to previous visits using that browser, for instance. If the website includes images and content taken from other web servers, that same information is sent to other websites as part of downloading or viewing the page. Advertising networks, analytics providers, and other data collectors may gather information from you in this way.<br>You can install additional software that runs alongside your browser and will limit how much information is leaked to third-parties in this way. The most well-known examples are programs that block advertisements. EFF offers a tool called Privacy Badger which is another traffic-blocking extension.<br>Source EFF ||  ||  
|-
| You can install additional software that runs alongside your browser and will limit how much information is leaked to third-parties in this way. The most well-known examples are programs that block advertisements. EFF offers a tool called Privacy Badger which is another traffic-blocking extension.
|-
| Source EFF." ||  ||  
|-
| Transport encryption || Noun || Encrypting data as it travels across the network, so that others spying on the network cannot read it.
|-
| Synonyms: transport-layer encryption.
|-
| Source EFF." ||  ||
|-
| Transport layer encryption || Noun || Encrypting data as it travels across the network, so that others spying on the network cannot read it.
|-
|-
| Synonyms: Transport encryption.
| Transport encryption || Noun || Encrypting data as it travels across the network, so that others spying on the network cannot read it.<br>Synonyms: transport-layer encryption.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||  
| Transport layer encryption || Noun || Encrypting data as it travels across the network, so that others spying on the network cannot read it.<br>Synonyms: Transport encryption.<br>Source EFF ||  ||  
|-
|-
| Transport layer security || Noun || The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
| Transport layer security || Noun || The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).<br>Synonyms: Secure Sockets Layer (SSL).<br>Source EFF ||  ||
|-
|-
| Synonyms: Secure Sockets Layer (SSL).
| Two-factor authentication || Noun || "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.<br>Synonyms: two-step verification, multi-factor authentication.<br>Source EFF ||  ||
|-
|-
| Source EFF." ||  ||
| Two-step verification || Noun || "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.<br>Synonyms: Two-factor authentication, multi-factor authentication.<br>Source EFF ||  ||  
|-
| Two-factor authentication || Noun || "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
|-
| Synonyms: two-step verification ||  multi-factor authentication.
|-
| Source EFF." ||  ||
|-
| Two-step verification || Noun || "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
|-
| Synonyms: Two-factor authentication ||  multi-factor authentication.
|-
| Source EFF." ||  ||  
|-
|-
| UI || Noun || user interface ||  ||  
| UI || Noun || user interface ||  ||  
Line 1,520: Line 1,212:
| Unavailable || Adjective || [Globaleaks] ||  ||  
| Unavailable || Adjective || [Globaleaks] ||  ||  
|-
|-
| Undelete software || Noun || Most devices let you delete data from them; For instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone. Undelete programs are applications that can be used by the device's owner, or others with access to the device, to restore some data. Undelete programs are useful for those who accidentally delete their own data, and to those whose data might have been sabotaged, such as a photographer who has been compelled to remove images from their camera. However, those same programs can be a threat to anyone who wants to permanently erase confidential data.
| Undelete software || Noun || Most devices let you delete data from them; For instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone. Undelete programs are applications that can be used by the device's owner, or others with access to the device, to restore some data. Undelete programs are useful for those who accidentally delete their own data, and to those whose data might have been sabotaged, such as a photographer who has been compelled to remove images from their camera. However, those same programs can be a threat to anyone who wants to permanently erase confidential data.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Undo || Verb ||  ||  ||  
| Undo || Verb ||  ||  ||  
Line 1,542: Line 1,232:
| Virtual Machine (VM) || Noun || "virtual machine" ||  ||  
| Virtual Machine (VM) || Noun || "virtual machine" ||  ||  
|-
|-
| Virtual Private Network || Noun || A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.
| Virtual Private Network || Noun || A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.<br>VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.<br>Synonyms: VPN.<br>Source EFF ||  ||  
|-
| VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship ||  or defeat local surveillance.
|-
| Synonyms: VPN.
|-
| Source EFF." ||  ||  
|-
| Virtual Private Network (VPN) || Noun || A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.
|-
|-
| VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship ||  or defeat local surveillance.
| Virtual Private Network (VPN) || Noun || A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.<br>VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.<br>Synonyms: Virtual Private Network.<br>Source EFF ||  ||  
|-
| Synonyms: Virtual Private Network.
|-
| Source EFF." ||  ||  
|-
|-
| Virtual Private Server (VPS) || Noun || Virtual Private Server ||  ||  
| Virtual Private Server (VPS) || Noun || Virtual Private Server ||  ||  
|-
|-
| VoIP || Noun || Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
| VoIP || Noun || Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.<br>Synonyms: Voice over IP.<br>Source EFF ||  ||  
|-
| Synonyms: Voice over IP.
|-
| Source EFF." ||  ||  
|-
|-
| VoIP Call || Noun ||  ||  ||  
| VoIP Call || Noun ||  ||  ||  
|-
|-
| Voice over IP (VoIP) || Noun || Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
| Voice over IP (VoIP) || Noun || Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.<br>Synonyms: VoIP.<br>Source EFF ||  ||  
|-
| Synonyms: VoIP.
|-
| Source EFF." ||  ||  
|-
|-
| WAN || Noun ||  ||  ||  
| WAN || Noun ||  ||  ||  
Line 1,578: Line 1,248:
| Warning || Interjection || ex: “Warning! Selecting 'OK' will permanently delete all files” ||  ||  
| Warning || Interjection || ex: “Warning! Selecting 'OK' will permanently delete all files” ||  ||  
|-
|-
| Wear leveling || Noun || Some forms of digital storage, like the flash memory used in solid-state drives (SSD) and USB sticks, can wear out if overwritten many times. Wear leveling is a method that spreads the writing of data evenly across all of the media to prevent one part of it being overwritten too many times. Its benefit is that it can make devices last longer. The danger for security-conscious users is that wear leveling interferes with secure erase programs, which deliberately try to overwrite sensitive files with junk data in order to permanently erase them. Rather than trusting secure erase programs with files stored on SSD or USB flash drives, it can be better to use full-disk encryption. Encryption avoids the difficulty of secure erasing by making any file on the drive difficult to recover without the correct passphrase.
| Wear leveling || Noun || Some forms of digital storage, like the flash memory used in solid-state drives (SSD) and USB sticks, can wear out if overwritten many times. Wear leveling is a method that spreads the writing of data evenly across all of the media to prevent one part of it being overwritten too many times. Its benefit is that it can make devices last longer. The danger for security-conscious users is that wear leveling interferes with secure erase programs, which deliberately try to overwrite sensitive files with junk data in order to permanently erase them. Rather than trusting secure erase programs with files stored on SSD or USB flash drives, it can be better to use full-disk encryption. Encryption avoids the difficulty of secure erasing by making any file on the drive difficult to recover without the correct passphrase.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| Web || Noun ||  ||  ||  
| Web || Noun ||  ||  ||  
|-
|-
| Web browser || Noun || The program you use to view web sites on the Internet. Firefox, Safari, Internet Explorer and Chrome are all web browsers. Smartphones have a built-in web browser app for the same purpose.
| Web browser || Noun || The program you use to view web sites on the Internet. Firefox, Safari, Internet Explorer and Chrome are all web browsers. Smartphones have a built-in web browser app for the same purpose.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
| Web-based proxy || Noun || A website that lets its users access other, blocked or censored websites. Generally, the web proxy will let you type a web address (or URL) onto a web page, and then redisplay that web address on the proxy page. Easier to use than most other censorship-circumventing services.
|-
|-
| Source EFF." ||  ||  
| Web-based proxy || Noun || A website that lets its users access other, blocked or censored websites. Generally, the web proxy will let you type a web address (or URL) onto a web page, and then redisplay that web address on the proxy page. Easier to use than most other censorship-circumventing services.<br>Source EFF ||  ||  
|-
|-
| WebApp || Noun ||  ||  ||  
| WebApp || Noun ||  ||  ||  
Line 1,604: Line 1,268:
| World Wide Web || Noun ||  || شبکه جهانی وب ||  
| World Wide Web || Noun ||  || شبکه جهانی وب ||  
|-
|-
| XMPP || Noun || A open standard for instant messages - Google uses XMPP for Google Talk; Facebook used to offer it, but stopped. Non-corporate independent instant messaging services will usually use XMPP. Services like WhatsApp have their own, closed and secret protocol.
| XMPP || Noun || A open standard for instant messages - Google uses XMPP for Google Talk; Facebook used to offer it, but stopped. Non-corporate independent instant messaging services will usually use XMPP. Services like WhatsApp have their own, closed and secret protocol.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| YYYY || Noun || “Year” Indicates that user must input a 4-digit year (ex: 1990) ||  ||  
| YYYY || Noun || “Year” Indicates that user must input a 4-digit year (ex: 1990) ||  ||  
Line 1,612: Line 1,274:
| Yes || Noun ||  ||  ||  
| Yes || Noun ||  ||  ||  
|-
|-
| Zero day || Noun || A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers hear of the flaw and fix it, attackers can use it for their own purposes.
| Zero day || Noun || A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers hear of the flaw and fix it, attackers can use it for their own purposes.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| about || Preposition || [Globaleaks] ||  ||  
| about || Preposition || [Globaleaks] ||  ||  
Line 1,646: Line 1,306:
| add || Verb ||  ||  ||  
| add || Verb ||  ||  ||  
|-
|-
| add-on || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
| add-on || Noun || A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.<br>Synonyms: extensions, plugins.<br>Source EFF || افزودنی ||  
|-
| Synonyms: extensions ||  plugins.
|-
| Source EFF." || افزودنی ||  
|-
|-
| added || Adjective ||  ||  ||  
| added || Adjective ||  ||  ||  
Line 1,666: Line 1,322:
| advanced Search || Noun ||  ||  ||  
| advanced Search || Noun ||  ||  ||  
|-
|-
| adversary || Noun || Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.
| adversary || Noun || Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| agent || Noun ||  ||  ||  
| agent || Noun ||  ||  ||  
|-
|-
| air gap || Noun || A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.
| air gap || Noun || A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| air gapped || Adjective ||  ||  ||  
| air gapped || Adjective ||  ||  ||  
Line 1,698: Line 1,350:
| anonymity || Noun ||  ||  ||  
| anonymity || Noun ||  ||  ||  
|-
|-
| anonymization || Noun || "It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous."
| anonymization || Noun || "It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous."<br>https://en.wikipedia.org/wiki/Data_anonymization" || بی نام سازی ||  
|-
| https://en.wikipedia.org/wiki/Data_anonymization" || بی نام سازی ||  
|-
| anonymize || Verb || To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous.
|-
|-
| https://en.wikipedia.org/wiki/Data_anonymization" || گمنام ||  
| anonymize || Verb || To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous.<br>https://en.wikipedia.org/wiki/Data_anonymization" || گمنام ||  
|-
|-
| anonymous || Adjective ||  || بی نام ||  
| anonymous || Adjective ||  || بی نام ||  
Line 1,710: Line 1,358:
| app || Noun || Abbreviation of "application." ||  ||  
| app || Noun || Abbreviation of "application." ||  ||  
|-
|-
| application || Noun || An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.
| application || Noun || An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.<br>https://en.wikipedia.org/wiki/Application_software" ||  ||  
|-
| https://en.wikipedia.org/wiki/Application_software" ||  ||  
|-
|-
| apply || Verb ||  || اعمال کردن ||  
| apply || Verb ||  || اعمال کردن ||  
Line 1,720: Line 1,366:
| approve || Verb ||  ||  ||  
| approve || Verb ||  ||  ||  
|-
|-
| archive || Noun || An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.
| archive || Noun || An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.<br>https://en.wikipedia.org/wiki/Archive_file" || بایگانی ||  
|-
| https://en.wikipedia.org/wiki/Archive_file" || بایگانی ||  
|-
|-
| archive || Verb || To write a document from the internal memory onto an external media. ||  ||  
| archive || Verb || To write a document from the internal memory onto an external media. ||  ||  
Line 1,750: Line 1,394:
| available || Adjective ||  || در دسترس ||  
| available || Adjective ||  || در دسترس ||  
|-
|-
| avatar || Noun || * Real or fantasy character, persona representing a user or player in the virtual world
| avatar || Noun || * Real or fantasy character, persona representing a user or player in the virtual world<br>* A computer generated visual icon used as an alternative digital fingerprint.<br>Synonym: identicon ||  ||  
|-
| * A computer generated visual icon used as an alternative digital fingerprint.
|-
| Synonym: identicon." ||  ||  
|-
|-
| back || Noun || As in Back button || پشت ||  
| back || Noun || As in Back button || پشت ||  
Line 1,760: Line 1,400:
| back up || Verb ||  ||  ||  
| back up || Verb ||  ||  ||  
|-
|-
| background || Noun || Screen surface where text and graphic elements are displayed
| background || Noun || Screen surface where text and graphic elements are displayed ,زمینه || ||
|-
| ,زمینه,
|-
| backup || Noun || Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
|-
|-
| It can be stored locally ||  on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely." || پشتیبان ||  
| backup || Noun || Copy of data, updated regularly or not, in order to allow restoration in case of data loss.<br>It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely." || پشتیبان ||  
|-
|-
| bandwidth || Noun ||  || پهنای باند ||  
| bandwidth || Noun ||  || پهنای باند ||  
Line 1,788: Line 1,424:
| blocked access || Noun ||  || دسترسی مسدود ||  
| blocked access || Noun ||  || دسترسی مسدود ||  
|-
|-
| blockfile || Noun || [I2P] Referring to the file format/name service.
| blockfile || Noun || [I2P] Referring to the file format/name service.<br>https://geti2p.net/spec/blockfile" ||  ||  
|-
| https://geti2p.net/spec/blockfile" ||  ||  
|-
|-
| blog || Noun ||  ||  ||  
| blog || Noun ||  ||  ||  
Line 1,992: Line 1,626:
| conversation || Noun || A "conversation" is the same as a message "thread" ||  ||  
| conversation || Noun || A "conversation" is the same as a message "thread" ||  ||  
|-
|-
| cookie || Noun || [Globaleaks]
| cookie || Noun || [Globaleaks]<br>Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in.<br>Source EFF ||  ||  
|-
| Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts ||  save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go ||  which devices you use ||  and what you are interested in – even if you don't have an account with that site ||  or aren't logged in.
|-
| Source EFF." ||  ||  
|-
|-
| copy || Verb ||  ||  ||  
| copy || Verb ||  ||  ||  
Line 2,038: Line 1,668:
| decompression || Noun ||  || uncompression ||  
| decompression || Noun ||  || uncompression ||  
|-
|-
| decrypt || Verb || Make a secret message or data intelligible. The idea behind encryption is to make messages that can only be decrypted by the person or people who are meant to receive them.
| decrypt || Verb || Make a secret message or data intelligible. The idea behind encryption is to make messages that can only be decrypted by the person or people who are meant to receive them.<br>Source EFF." || رمزگشایی ||  
|-
| Source EFF." || رمزگشایی ||  
|-
|-
| decrypted || Adjective ||  ||  ||  
| decrypted || Adjective ||  ||  ||  
Line 2,110: Line 1,738:
| encoded || Adjective ||  ||  ||  
| encoded || Adjective ||  ||  ||  
|-
|-
| encrypt || Verb || To apply encryption technology to any sort of information or communication. This transforms the information or communication mathematically so that it seems meaningless, but can still be restored to its original form by a person or device that possesses the right secret key. This limits who can access the information because without the right secret key, it should be impossible to reverse the encryption and recover the original information. Encryption is one of several technologies that make up the field called cryptography.
| encrypt || Verb || To apply encryption technology to any sort of information or communication. This transforms the information or communication mathematically so that it seems meaningless, but can still be restored to its original form by a person or device that possesses the right secret key. This limits who can access the information because without the right secret key, it should be impossible to reverse the encryption and recover the original information. Encryption is one of several technologies that make up the field called cryptography.<br>Source EFF || رمزگذاری || [https://fa.wikipedia.org/wiki/%D8%B1%D9%85%D8%B2%DA%AF%D8%B0%D8%A7%D8%B1%DB%8C ویکی‌پدیا]
|-
| Source EFF." || رمزگذاری || https://fa.wikipedia.org/wiki/%D8%B1%D9%85%D8%B2%DA%AF%D8%B0%D8%A7%D8%B1%DB%8C
|-
|-
| encrypted || Adjective ||  || رمزگذاری ||  
| encrypted || Adjective ||  || رمزگذاری ||  
Line 2,122: Line 1,748:
| end-to-end || Conjunction ||  || نظیر به نظیر ||  
| end-to-end || Conjunction ||  || نظیر به نظیر ||  
|-
|-
| end-to-end encryption || Noun || End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption.
| end-to-end encryption || Noun || End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption.<br>Source EFF ||  ||  
|-
| Source EFF." ||  ||  
|-
|-
| enter || Verb ||  ||  ||  
| enter || Verb ||  ||  ||  
Line 2,186: Line 1,810:
| find || Verb ||  ||  ||  
| find || Verb ||  ||  ||  
|-
|-
| fingerprint || Noun || The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits.  So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.
| fingerprint || Noun || The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits.  So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.<br>Source EFF." || اثر انگشت ||  
|-
| Source EFF." || اثر انگشت ||  
|-
|-
| fingerprint identification || Noun ||  ||  ||  
| fingerprint identification || Noun ||  ||  ||  
Line 2,322: Line 1,944:
| kernel || Noun ||  ||  ||  
| kernel || Noun ||  ||  ||  
|-
|-
| key || Noun || In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message.
| key || Noun || In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message.<br>Source EFF<br>[Globaleaks] ||  ||  
|-
| Source EFF.
|-
| [Globaleaks]" ||  ||  
|-
|-
| key code || Noun || [Globaleaks] ||  ||  
| key code || Noun || [Globaleaks] ||  ||  
Line 2,336: Line 1,954:
| key owner || Noun ||  ||  ||  
| key owner || Noun ||  ||  ||  
|-
|-
| key pair || Noun || To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a "key pair."
| key pair || Noun || To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a "key pair."<br>Source EFF.<br>Synonym: keypair ||  ||  
|-
| Source EFF.
|-
| Synonym: keypair" ||  ||  
|-
|-
| key password || Noun ||  ||  ||  
| key password || Noun ||  ||  ||  
Line 2,348: Line 1,962:
| keychain || Noun ||  ||  ||  
| keychain || Noun ||  ||  ||  
|-
|-
| keyring || Noun || If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring.
| keyring || Noun || If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring.<br>Source EFF." || دسته کلید ||  
|-
| Source EFF." || دسته کلید ||  
|-
|-
| keyserver || Noun ||  || سرور کلید ||  
| keyserver || Noun ||  || سرور کلید ||  
Line 2,548: Line 2,160:
| passcode || Noun || A user-chosen and device-specific password ||  ||  
| passcode || Noun || A user-chosen and device-specific password ||  ||  
|-
|-
| passphrase || Noun || A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/
| passphrase || Noun || A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/<br>Source EFF<br>[Peerio] A computer-generated set of 6-10 random words used as the primary authentication for Peerio accounts." || کلمه عبور ||  
|-
| Source EFF.
|-
| [Peerio] A computer-generated set of 6-10 random words used as the primary authentication for Peerio accounts." || کلمه عبور ||  
|-
| password || Noun || A secret meant to be memorized, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a "passphrase" to remind us that it's not just one "word." A main password to unlock other passwords in a password manager or password safe application is often called a "master password.”
|-
|-
| Source EFF." || رمز عبور ||  
| password || Noun || A secret meant to be memorized, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a "passphrase" to remind us that it's not just one "word." A main password to unlock other passwords in a password manager or password safe application is often called a "master password.”<br>Source EFF || رمز عبور ||  
|-
|-
| paste || Noun ||  ||  ||  
| paste || Noun ||  ||  ||  
Line 2,668: Line 2,274:
| public key || Noun ||  || کلید عمومی ||  
| public key || Noun ||  || کلید عمومی ||  
|-
|-
| public key / public account key || Noun || [Martus]
| public key / public account key || Noun || [Martus]<br>The Martus account's public key" || کلید عمومی ||  
|-
| The Martus account's public key" || کلید عمومی ||  
|-
|-
| public key infrastructure || Noun ||  ||  ||  
| public key infrastructure || Noun ||  ||  ||  

Revision as of 17:42, 4 May 2018

  Browse or search the glossary below using ctrl / command + f. A downloadable version of this glossary is available in [Google Drive]. Feel free to add comments to the Google Drive version of the glossary or add comments to the wiki if you have suggestions or disagree with translations.
term pos comment translation_fa comment_fa
! Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex
" Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex "
"%s" Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex
"connect" Verb
&nbsp; Conjunction HTML non-breaking space
' Apostrophe
24/7 Noun Twenty-four hours, seven days a week. This essentially means "all the time". Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running.
3D bar chart Noun نمودار سه بعدی
: Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex
; Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex
? Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex
A reasonably secure operating system Noun [Qubes OS] This is the Qubes OS tagline.
A security-oriented operating system Noun [Qubes OS]
API Noun Application Programming Interface: "In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software." - Wikipedia
APK Noun "Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10." https://en.wikipedia.org/wiki/Android_application_package
Access Mode Noun
Access Token Noun Short identification number used to add Contacts to your Martus account. رمز دسترسی
Account Recovery Noun بازیابی حساب کاربری
Account Recovery Code Noun
Anti Evil Maid Noun [Qubes OS] Do not translate.
Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks.
Source: https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html
Antivirus Noun Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.
Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.
Source EFF."
آنتی‌ویروس
AppVM Noun [Qubes OS] "Application Virtual Machine"A VM which is intended for running software applications.
Asset Noun In threat modeling, any piece of data or a device that needs to be protected.
Source EFF."
Asymmetric-key encryption Noun Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
Synonyms: Public key encryption, Public key cryptography.
Source EFF
Attach Verb To attach a file to a message
Attack Noun In computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."
Source EFF."
Attacker Noun
Autocrypt Setup Message Noun [Enigmail, OpenKeychain and other email clients]
Autonomous System number Noun تعداد سیستم خودمختار
BCC Noun "Blind carbon copy"
Backlog Noun Delayed proccessing of some sort
Backup Key File Noun Also: key backup
Bar Chart Noun نمودار بار
Benetech Noun Company name which should not be translated or transcribed.
Best-effort delivery Noun
Beta Noun
Blocking Noun Synonyms: filtering, censoring Internet traffic.
Blocking resistant Adjective
Blow the Whistle Verb [Globaleaks]
Bounty Noun
Browse Verb [Globaleaks]
Browser fingerprint Noun The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.
Source EFF.
Buffer Noun
Built Verb
Burner phone Noun A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.
Synonyms: Throwaway
Source EFF.
C&C Noun A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: Command and control server, C2.
Source EFF
C2 Noun A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: Command and control server, C2.
Source EFF
CPU Noun
CSR Noun Certificate Signing Request
CSRF Noun
Cache-busting Noun
Calendar Noun
Capability Noun The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
Source EFF
Car documents Noun [Umbrella]
Carjacking Noun
Chat Noun
ChatSecure Noun Application Name
Checkpoint Noun
Chokepoint Noun
Choker Noun
Chrome Web Store Noun
Chronic stress Noun
Cipher Noun
Circumvention Verb
Circumvents Verb [Globaleaks]
Clearnet Noun بخش عمومی
Client User Interface Noun
ClockVM Noun
Close Verb [Globaleaks]
Collection Noun
Collusion Noun
Column Noun ردیف
Command and control server Noun A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: C&C, C2.
Source EFF
Command line tool Noun The "command line" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the responses don't match your expectations.
Source EFF."
ابزار خط فرمان
Commercial VPN Noun A commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, or untrusted local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The down side is that most of the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to snoop on your traffic.
Source EFF
Commit Noun
Commit Verb
Compartmentalization Noun
Compartmentalize Verb
Configuration Noun
Configuration Verb
Confirm Verb تأیید
Constraint Noun
Contact Noun [Martus] Another Martus user with whom you can share your Martus bulletins. مخاطب
Control panel Noun
Conventional Adjective
Cookies Noun
Corporate Intranet Noun Companies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.
Source EFF
Courier Noun
Credentials Noun
Cropping Noun
Crypto Adjective
Crypto Noun
Cryptocurrency Noun
Cryptographic signature Noun The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
Synonyms: digital Signature
Source EFF."
Cryptography Noun The art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.
Source EFF
Cryptoparty Noun When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
Analogy: It's like a networking party, where you introduce your friends to other friends.
Synonyms: key-signing party.
Source EFF
Current Adjective
Custom Adjective
Customization Noun [Globaleaks]
Customization Template Files (*.mct) Noun
Customize Verb
DD Noun
DDoS Noun A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
Synonyms: Distributed Denial of Service attack.
Source EFF."
DHT Noun
DNS Noun DNS دی ان اس
DVM Noun An abbreviation of DispVM, typically used to refer to DVM Templates.
DVM Template Noun TemplateBasedVMs on which DispVMs are based.
Darknet Noun
Dashboard Noun
Data Source Grid Noun شبکه منبع اطلاعات
Data-Driven Dropdown (Field) Noun
Datastorage Noun ذخیره داده
Date Range Noun
Debriefing Noun
Deck Noun [Ooniprobe] This is a collection of ooniprobe tests and inputs.
Declined Verb
Dedicated Server Noun [Globaleaks]
Default Adjective [Globaleaks]
Default Noun
Default Server Noun
Delay Noun
Delete Verb [Globaleaks]
Deletion Noun [Globaleaks]
Deselect Verb
Desktop Client Noun نسخه دسکتاپی
Device Management Noun
Digital Adjective
Digital Signature Noun The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.
Synonyms: cryptographic signature.
Source EFF
Digital certificate Noun A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
Synonyms: Security certificate.
Source EFF
Directory Noun
Disable Verb
Discard Verb دور انداختن
Disk Noun In most contexts in Martus, "disk" refers to any sort of removable storage device (USB, CD, floppy disk etc.)
DispVM Noun [QubesOS] "Disposable Virtual Machine"A temporary AppVM based on a DVM Template which can quickly be created, used, and destroyed.
Display Keys Verb
Distributed Verb
Distributed denial of service attack Noun A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
Synonyms: DDoS.
Source EFF
Distribution Noun توزیع
Distributions Noun
Dom0 Noun [QubesOS] "Domain Zero" Also known as the **host** domain, dom0 is the initial VM started by the Xen hypervisor on boot.
DomU Noun [QubesOS] "Unprivileged Domain"Also known as **guest** domains, domUs are the counterparts to dom0.
Domain name Noun The address, in words, of a website or Internet service; for example: ssd.eff.org
Source EFF
Download Verb [Globaleaks]
Drag and Drop Noun
Drawer Noun
DuckDuckGo Noun Name of an open source search engine. DuckDuckGo داک داک گو
Dump Noun
Dump Verb
E-mail Noun
Edge Noun
Edge server Noun
Edge servers
Edges Noun
Eligibility criteria Noun
Email Subject Noun [Globaleaks]
Email address Noun
Encrypted Verb [Globaleaks]
Encryption
Encryption Noun A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form.
Source EFF.
[Globaleaks]
Encryption key Noun An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different.
Source EFF.
[Globaleaks]
Ensure Verb
Enter Verb equiv. type
Event Noun
Expiry Noun
Extension Noun A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
Synonyms: Add-on, Plugin.
Source EFF
External drive Noun
Extra text Noun
FAI satellite Noun
FAQ Noun “Frequently Asked Questions”
FOSS Noun Free and open-source software
FTP server Noun An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
Synonyms: FTP server, File Transfer Protocol
Source EFF
Fallback Adjective [Globaleaks]
Fallback Noun
Feedback Noun
Fetch Verb
Fetching Noun
Field
Field Noun [Globaleaks] فیلد
File Noun [Globaleaks]
File Transfer Protocol Noun An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.
Synonyms: FTP server, File Transfer Protocol.
Source EFF.
File fingerprint Noun A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
Synonyms: file hash value.
Source EFF
File hash value Noun A sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
Synonyms: File fingerprint.
Source EFF
File system Noun Where data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.
Source EFF
Firefox Noun
Firewall Noun A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways.
Source EFF
FirewallVM Noun "Firewall Virtual Machine"A type of ProxyVM which is used to enforce network-level policies (a.k.a. "firewall rules").
Firewalled Adjective
Firmware Noun
Fix Noun
Fixes Noun
Folder Options Noun تنظیمات پوشه
Form Noun
Forum Noun
Forward Secrecy Noun A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
Synonyms: Perfect forward secrecy.
Source EFF.
Freedom Noun
Frequently Asked Questions Noun “FAQ”
Full disk encryption Noun If you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.
Source EFF
Functionalities Noun
Functionality Noun
GC Noun Garbage collector
GFW Noun
GNU General Public License Noun
GPG Noun "Gnu Privacy Guard" GPG is a free software that implements OpenPGP specification
Garbage data Noun
Garlic Noun https://en.wikipedia.org/wiki/Garlic_routing
Garlic routing Noun https://en.wikipedia.org/wiki/Garlic_routing
Generator Noun
Generator Noun
Get Access Mode Noun [Lantern]
GetTor Noun [Tor] دانلود Tor گرفتن Tor
Getting started Noun
Ghost Noun [Peerio] "Ghost" is used as a proper noun in Peerio for a feature that allows users to send messages and files to non-Peerio users via email or URL. This URL can be accessed with a secret passphrase and the messsage is decrypted in the browser. "I sent you a (Peerio) Ghost"
Give Access Mode Noun [Lantern]
GlobaLeaks Noun [Globaleaks]
Go Back Verb
Google Verb Company Name (Reference Google.com for appropriate transcription if applicable)
Google Captcha Noun گوگل کد امنیتی
Google Chrome Noun
Google Drive Noun
Graceful Shutdown Noun [I2P]
Gracefully Adverb
Graph Noun
Graph Verb
Great Firewall of China Noun فایروال بزرگ چین
Grid Noun شبکه
HQ Noun
HRD Noun Human Rights Defence
HTTP Noun "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web." - Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol)
HTTP Header Field Manipulation Noun
HTTP Invalid Request Line Noun
HTTPS Noun If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes.
Source EFF.
HTTPS Everywhere Noun HTTPS در همه جا
HTTPS certificate Noun گواهی HTTPS
HVM Noun "Hardware Virtual Machine"Any fully virtualized, or hardware-assisted, VM utilizing the virtualization extensions of the host CPU.
Hardcoded Verb
Hardware Noun
Header Noun
Headline Noun
Heartbeat Noun
Helper link Noun
Hidden Adjective
Hidden Service Noun سرویس مخفی
High bandwidth Noun
High capacity Noun
High latency Noun
High-latency Noun
History Noun As in "Browser History"
Home Noun [Globaleaks]
Homepage Noun [Globaleaks]
Hop Noun واسطه این به این معناست که حداکثر با چند ارتباط بین روترها می توان اطلاعات را دریافت و ارسال کرد و چون حداکثر ارتباط را نشان می دهد به نوعی میزان امیدواری برای ارتباط هم نیز هست اما چون امید ارتباط واژه مناسبی نیست به نظرم واسط مناسب باشد
Hosting provider Noun
Hotspot Noun
Housekeeping Noun
I/O Noun Input/ouput
I2P Noun I2P
ID Noun شناسایی
IDE Noun
IMAP settings Noun IMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.
Source EFF.
IP address Noun A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online.
Source EFF.
آدرس IP
ISP Noun “Internet Service Provider
Identicon Noun A computer generated visual icon used as an alternative digital fingerprint. aka "identicon".
Synonym: avatar
Immediate Adjective
Implement Verb
Inbound Adjective
Include Private Data Verb
Indicators of compromise Noun Clues that show that your device may have been broken into or tampered with.
Source EFF
Internet Noun اینترنت
Internet Service Provider Noun ISP ارائه دهنده خدمات اینترنتی ISP
Internet filtering Noun Filtering is the politer term for blocking or censoring Internet traffic.
Synonyms: blocking.
Source EFF.
Introduce Verb
Introducer Noun
Introduction Noun
Invalid Adjective نامعتبر
Item Noun
JS Noun
Javascript Noun
Join Verb
KB/s Noun
KBps Noun
Key Backup Noun
Key Exchange Noun
Key fingerprint Noun A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.
Source EFF.
Key verification Noun In public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.
Source EFF."
Key-signing party Noun When you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
Analogy: It's like a networking party, where you introduce your friends to other friends.
Synonyms: cryptoparty.
Source EFF.
Keyboard Noun صفحه کلید
Keyboard Layout Noun
Keylogger Noun A malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.
Source EFF.
Label Noun [Globaleaks]
Language Noun [Globaleaks]
Language pack Noun
Lantern Noun Application Name (https://getlantern.org)
Lantern Cloud Server Noun [Lantern]
Launcher Noun پرتاب کننده
Leak Noun Synonym: data leakage
Lease Noun
Leaseset Noun
License Agreement Noun [Globaleaks]
Link Noun
Linked Identity Noun
List Noun
Listen Verb
Live CD Noun
Live ISO Noun زنده ISO
Live OS Noun
Live System Noun سیستم زنده
Live USB Noun
Load Noun [Globaleaks]
Load Verb
Loading Verb [Globaleaks]
Log Noun
Log Verb [Globaleaks]
Log file Noun
Logging Noun
Login page Noun
Logout Noun [Globaleaks]
Logs Noun
MBR Noun MBR, Master Boot Record, MBR مستر بوت رکورد، MBR"
MITM Noun Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
Synonyms: Man-in-the-middle attack.
Source EFF.
MM Noun
Machine-learning Noun
Magic Word Noun کلمه جادویی
Mail routes Noun
Maintainer Noun نگاه دارنده
Malformed Adjective
Malicious Adjective
Malicious software Noun Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
Synonyms: Malware.
Source EFF.
Malware Noun Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
Synonyms: Malicious software
Source EFF.
Man-in-the-middle attack Noun Suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
Synonyms: MITM
Source EFF.
Manage Contacts Noun [Martus] Martus menu option. مدیریت مخاطبان
Martus Desktop Noun [Martus]
Martus Desktop Application Noun [Martus]
Martus Information Management and Data Collection Framework Noun [Martus]
Martus Record Archive (*mba) Noun [Martus]
Martus Report Format (.mrf) Noun [Martus]
Martus Search Specification Noun [Martus]
Master Boot Record, MBR Noun مستر بوت رکورد، MBR
Master password Noun A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.
Source EFF.
Matching Adjective [Globaleaks]
Megabytes Noun [Globaleaks]
Menu
Menu Noun منوی
Message Format Noun
Message Of The Day Noun
Mirrors Noun آینه ها
Mixnet Noun
Mobile Martus Noun [Martus]
Multihome Noun
Multihoming Noun
My Computer Noun The user’s home folder in some operating systems. کامپیوتر من
NAT Noun
NGO Noun Non-Governmental Organization
Name Noun
Naming service Noun
Navegador Tor Noun
NetDB Noun network database
NetVM Noun "Network Virtual Machine"A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM.
Network Noun شبکه
Network database Noun
Network drive Noun
Newsletter Noun
Next Noun “Next” button
No Noun
Node Noun گره
Non-Tor Noun غیر از Tor
Notification Noun [Globaleaks]
OK Noun “OK” button which can also be translated as “Accept”
OS Noun Operating system
OTR Noun Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.
The OTR cryptographic protocol provides strong encryption for instant messaging conversations.
Synonyms : Off-the-Record
Source EFF
Observatory Noun رصد خانه
Off Adjective
Off-the-Record Noun Instant messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance.
The OTR cryptographic protocol provides strong encryption for instant messaging conversations.
Synonyms : OTR.
Source EFF.
One-time password Noun Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
Source EFF
Onion Noun [Tor]
Onion Address Noun [Tor] پیاز آدرس
Onion Browser Noun [Tor]
Onion Circuits Noun [Tor]
Onion routing Noun [Tor]
Open-source software Noun Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.
Synonyms: FLOSS, free, libre and open-source software, free software
Source EFF
OpenPGP Noun OpenPGP is a open specification and standard that implements PGP (Pretty Good Privacy)
OpenPGP key Noun کلید OpenPGP
Operating system Noun A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems.
Source EFF.
Synonym: OS
Optional Setup Noun
Options Noun
Orbot Noun
Out-of-band verification Noun "Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.
Synonyms: out-of-band
Source EFF
Overhead Noun
Overlay network Noun
Overview Noun [Globaleaks]
PDFs Noun
PGP Noun PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message,” even if they are using GnuPG.
Synonyms: Pretty Good Privacy.
Source EFF.
PV Noun [QubesOS] "Paravirtualization"An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.
PVHVM Noun [QubesOS] "Paravirtualization on Hardware Virtual Machine"To boost performance, fully virtualized HVM guests can use special paravirtual device drivers (PVHVM or PV-on-HVM drivers).
Padding Noun
Page Report Noun Type of report generated by Martus - not one page of a report.
Pane Noun
Panic Noun Panic button, panic app
Passive adversary Noun A passive adversary is one that can listen to your communications, but cannot directly tamper with them.
Source EFF.
Password manager Noun A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
Synonyms: Secure password database; password safe.
Source EFF
Password safe Noun A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
Synonyms: Secure password database, Password manager.
Source EFF
Payload Noun
Peer-to-Peer Adjective
Perfect forward secrecy Noun A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later.  For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it.  For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
Synonyms: Forward secrecy.
Source EFF
Persistence wizard Noun جادوگر تداوم
Persistent Storage Noun ذخیره دائمی
Personal information Noun
Phrases Noun
Pie Chart Noun نمودار دایره ای
Piece Noun
Plaintext Noun [Globaleaks]
Plan Noun
Plans Noun
Platform Noun [Globaleaks]
Platforms Noun
Please Adverb
Pluggable Transport Noun
Pluggable Transports Bundle Noun نردبان حمل و نقل بسته نرم افزاری
Plugin Noun A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
Synonyms: add-on, extension.
Source EFF
Ponte
Pool Noun
Port Noun درگاه
Post Noun
Post Verb
Post-traumatic stress Noun
Posted Verb
Postponed Adjective
Power Off Verb خاموش
Preferences Noun
Preparation Noun
Pretty Good Privacy Noun PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the US government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of US law.
PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message,” even if they are using GnuPG.
Synonyms: PGP.
Source EFF
Preview Verb
Primary Noun
Proceed Verb
Projects Noun
Protocol Noun A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging.
Source EFF
ProxyVM Noun [QubesOS] "Proxy Virtual Machine"A type of VM which proxies network access for other VMs
Pseudonym Noun A name that you choose to use in some context (like an online forum) and that others may come to recognize, but that isn’t connected to names that people know you by in your day-to-day life.
Source EFF
Psiphon Noun Name of the organization and tool. Please do not translate this term. If needed, you can transcribe the organization / tool name. For example, the name is transcribed in Arabic, Persian and Amharic.
Public Information File Noun
Public Information File (*.mpi) Noun Files containing the account's public information
Public key cryptography Noun Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
Synonyms: Public key encryption, Public key cryptography.
Source EFF
Public key encryption Noun Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing.
Synonyms: Asymmetric key encryption, Public key cryptography.
Source EFF
Public key servers Noun If you plan to send a secure message to someone who uses public key cryptography like PGP, you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such keys, allowing software to use an email address, name, or key fingerprint to search for a full key and download it. There are many PGP public key servers, but they usually share their key collections with each other. Keyservers can't verify whether the keys they publish are genuine or forgeries. Anyone can upload a key to a public key server—in anyone's name. That means that a key connected to a person's name or email on a keyserver might not be their real key. In order to check the authenticity of a key, you need to check its signatures, or confirm its fingerprint with the original user in a trustworthy way.
PGP allows you to sign other people's keys, which is a way of using your own key to assert that a certain key is the right one to use to contact another person. This is meant to provide a way of distinguishing between genuine and fake keys; if people sign the right keys for people they know and communicate with, others can use those signatures to confirm that the genuine keys are genuine. When you download a key from a key server, it may include signatures from other people who affirm that it's the right one. If you know those people and know that you have the right key for them, you can have more confidence in the newly downloaded key. This verification process is also called the web of trust. Its advantage is that it's decentralized and not controlled by any authority, so you don't have to believe a certain company or government about which keys to use when writing to new people. Instead, you can believe your own social networks. One important disadvantage of the web of trust is that publishing signatures for other people's keys tells the whole world who your contacts are; it creates public evidence that you know particular people. Also, using the web of trust correctly requires a good deal of  time and attention, and some communities rarely or never participate.
Source EFF
Q&A Noun
QR Code Noun
Qubes Global Settings Noun [QubesOS]
Qubes OS Noun [QubesOS] Do not translate "Qubes OS"
RAM Noun
RMI Noun RMI
Randomization Noun
Rate Noun
Read Verb
ReadMe Noun The ReadMe file included with any new software release that describes changes to software
Reboot Noun راه اندازی مجدد
Reboot Verb
Receiver Noun
Receivers Noun [Globaleaks]
Record Noun بولتن
Record ID Noun
Reference Guide Noun
Referer Noun مراجعه
Referer spoofing Noun حقه بازی مراجعه
Referral code Noun
Refresh Noun
Refresh Verb
Register Verb
Reject Verb
Release Verb انتشار
Release candidate Noun
Release key Noun
Release notes Noun
Reload Verb [Globaleaks]
Removable media Noun
Removable media drive Noun
Repliable datagram Noun
Report Noun [Globaleaks] گزارش
Request Noun [Globaleaks]
Request Verb
Required Adjective
Reseed Verb
Reseeding Noun
Reset Noun
Reset Verb [Globaleaks]
Restart Verb [Globaleaks]
Retry Verb
Retweet Noun
Retweet Verb
Reusable Choice Noun گزینه قابل استفاده
Revocation certificate Noun What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it when you still have the secret key, and keep it for any future disaster.
Source EFF
Rich Text Noun
Ring Tone Noun
Rip Noun
Rip Verb
Risk analysis Noun In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
Synonyms: Risk, Risk Assessment.
Source EFF
Risk assessment Noun In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling.
Synonyms: Risk, Risk analysis.
Source EFF
Roadmap Noun
Role-based access control Noun [Globaleaks]
Root Noun
Root Verb
Router Noun
RouterInfo Noun
Ruleset Tests Noun تست مجموعه دستور
Running environment Noun
Runtime Noun
SD card Noun
SIM card Noun A small, removable card that can be inserted into a mobile phone in order to provide service with a particular mobile phone company. SIM (subscriber identity module) cards can also store phone numbers and text messages.
Source EFF
SMS Noun Synonym: text message
SOCKS Noun "Socket Secure (SOCKS) is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded." - Wikipedia (https://en.wikipedia.org/wiki/SOCKS)
SSD (Solid-State Drive) Noun "A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive
SSH Noun SSH (or Secure Shell) is a method for letting you securely control a remote computer via a command line interface. One of the features of the SSH protocol is that as well as sending commands, you can also use it to securely relay Internet traffic between two computers. To set up an ssh link, the remote system needs to operate as a ssh server, and your local machine need an ssh client program.
Source EFF
SSL Observatory Noun رصدخانه SSL
START Verb
SVM Noun Support Vector Machine
Safe-house Noun
Sanitize Verb
Satellite Provider Noun
Save Verb [Globaleaks]
Scramble Verb
Search Engine Noun موتور جستجو
Search Results Noun Application menu item. نتايج جستجو
Secure Verb
Secure Sockets Layer (SSL) Noun The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
Synonyms: Transport layer security.
Source EFF.
Secure password database Noun A tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
Synonyms: Password manager, password safe.
Source EFF
Security certificate Noun A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.
Synonyms: Digital certificate.
Source EFF
Security question Noun To supplement passwords, some systems use "security questions." These are queries to which only you are supposed to know the answer. The problem with security questions is that they are really just extra passwords that have potentially guessable or discoverable answers. We recommend you treat them as any other password: create a long, novel, random, phrase to answer them, and record that somewhere safe. So the next time your bank asks you your mother's maiden name, you should be ready to answer "Correct Battery Horse Staple" or similar.
Source EFF
Security token Noun
Seed Noun
Seed Verb
Seeding Noun
Selector Noun
Sensitive Adjective
Server Noun [Globaleaks] سرور
ServiceVM Noun "Service Virtual Machine"A VM the primary purpose of which is to provide a service or services to other VMs.
Setting Noun تنظیمات
Settings Noun Application menu item.
Settings > Advanced Noun
Short User Manual Noun کتابچه راهنمای کاربر
Shutdown Noun
Shutdown Verb
Sidebar Noun
Sign In Verb [Globaleaks]
Signal Noun
Site Noun سایت
Socket Noun
Software Noun [Globaleaks]
Solid State Drive Noun Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives.
Synonyms: SSD.
Source EFF
Source Noun [Globaleaks]
Spooled Adjective
Standalone(VM) Noun [QubesOS] "Standalone (Virtual Machine)"In general terms, a VM is described as **standalone** if and only if it does not depend on any other VM for its root filesystem.
StandaloneHVM Noun [QubesOS] "Standalone Hardware Virtual Machine"Any HVM which is standalone (i.e., does not depend on any other VM for its root filesystem).
Standard Fields Noun
Start Verb [Globaleaks]
Stop Verb
Stream Noun
Subject Noun [Globaleaks]
Subtitle Noun [Globaleaks]
Support Vector Machine Noun SVM
Sync Manager Noun
Sys admin Noun
System administrator Noun
TLS Noun "Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, instant messaging, and voice-over-IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers." - Wikipedia (https://en.wikipedia.org/wiki/Transport_Layer_Security)
TRIM Noun
TRIM command Noun "A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally." https://en.wikipedia.org/wiki/Trim_(computing) [VeraCrypt]
TTL Noun
Tails Noun Name of the organization and tool. تیلز سیستم عامل فیلترشکن تیلز
Tails Installer Noun
Tap to explore Verb
Template Noun [Globaleaks]
TemplateBasedHVM Noun [QubesOS] "Template-Based Hardware Virtual Machine"Any HVM that depends on a TemplateVM for its root filesystem.
TemplateBasedVM Noun [QubesOS] "Template-Based Virtual Machine"Any VM which depends on a TemplateVM for its root filesystem.
TemplateHVM Noun [QubesOS] "Template Hardware Virtual Machine"Any HVM which functions as a TemplateVM by supplying [QubesOS] its root filesystem to other VMs.
TemplateVM Noun [QubesOS] "Template Virtual Machine."Any VM which supplies its root filesystem to another VM.
Text
Text message Noun Synonym: SMS
This browser Noun
Threat Noun In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded).
Source EFF
Threat model Noun A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.
Synonyms: Threat modeling.
Source EFF
Threat modeling Noun A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis.
Synonyms: Threat model.
Source EFF
Throwaway Noun A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.
Synonyms: Burner phone
Source EFF
Throwaway address Noun An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
Source EFF
Tip Noun [Globaleaks]
Toolkit Noun
Tools Noun Martus menu option. ابزارها
Tor Noun
Tor Bridges Noun
Tor Browser Noun Application Name (https://www.torproject.org/projects/torbrowser.html.en)
Tor Browser Bundle Noun
Tor Browser profile directory Noun
Tor Project Noun Organization name.
Tor network Noun شبکه Tor
Tor relay Noun بازپخش tor
Torbutton Noun
Traffic Noun [Globaleaks]
Traffic-blocking browser extension Noun When you visit a website, your browser sends some information to that site's operators -- your IP address, other information about your computer, and cookies that link you to previous visits using that browser, for instance. If the website includes images and content taken from other web servers, that same information is sent to other websites as part of downloading or viewing the page. Advertising networks, analytics providers, and other data collectors may gather information from you in this way.
You can install additional software that runs alongside your browser and will limit how much information is leaked to third-parties in this way. The most well-known examples are programs that block advertisements. EFF offers a tool called Privacy Badger which is another traffic-blocking extension.
Source EFF
Transport encryption Noun Encrypting data as it travels across the network, so that others spying on the network cannot read it.
Synonyms: transport-layer encryption.
Source EFF
Transport layer encryption Noun Encrypting data as it travels across the network, so that others spying on the network cannot read it.
Synonyms: Transport encryption.
Source EFF
Transport layer security Noun The technology that permits you to maintain a secure, encrypted connection between your computer and some of the websites and Internet services that you visit. When you're connected to a website through this technology, the address of the website will begin with HTTPS rather than HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 1999, but many people still use the old name, Secure Sockets Layer (SSL).
Synonyms: Secure Sockets Layer (SSL).
Source EFF
Two-factor authentication Noun "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
Synonyms: two-step verification, multi-factor authentication.
Source EFF
Two-step verification Noun "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
Synonyms: Two-factor authentication, multi-factor authentication.
Source EFF
UI Noun user interface
URL Noun آدرس اینترنتی
USB drive Noun Specifically thumbdrives used as external storage.
Unable Adjective [Globaleaks]
Unavailable Adjective [Globaleaks]
Undelete software Noun Most devices let you delete data from them; For instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone. Undelete programs are applications that can be used by the device's owner, or others with access to the device, to restore some data. Undelete programs are useful for those who accidentally delete their own data, and to those whose data might have been sabotaged, such as a photographer who has been compelled to remove images from their camera. However, those same programs can be a threat to anyone who wants to permanently erase confidential data.
Source EFF
Undo Verb
UpdateVM Noun [QubesOS]
Upload Noun [Globaleaks]
Upload Verb [Globaleaks]
Uploaded Adjective [Globaleaks]
UsbVM Noun [QubesOS]
Username Noun [Globaleaks]
Vidalia Noun
Virtual Machine (VM) Noun "virtual machine"
Virtual Private Network Noun A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.
VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
Synonyms: VPN.
Source EFF
Virtual Private Network (VPN) Noun A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location.
VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
Synonyms: Virtual Private Network.
Source EFF
Virtual Private Server (VPS) Noun Virtual Private Server
VoIP Noun Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
Synonyms: Voice over IP.
Source EFF
VoIP Call Noun
Voice over IP (VoIP) Noun Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
Synonyms: VoIP.
Source EFF
WAN Noun
Warning Interjection ex: “Warning! Selecting 'OK' will permanently delete all files”
Wear leveling Noun Some forms of digital storage, like the flash memory used in solid-state drives (SSD) and USB sticks, can wear out if overwritten many times. Wear leveling is a method that spreads the writing of data evenly across all of the media to prevent one part of it being overwritten too many times. Its benefit is that it can make devices last longer. The danger for security-conscious users is that wear leveling interferes with secure erase programs, which deliberately try to overwrite sensitive files with junk data in order to permanently erase them. Rather than trusting secure erase programs with files stored on SSD or USB flash drives, it can be better to use full-disk encryption. Encryption avoids the difficulty of secure erasing by making any file on the drive difficult to recover without the correct passphrase.
Source EFF
Web Noun
Web browser Noun The program you use to view web sites on the Internet. Firefox, Safari, Internet Explorer and Chrome are all web browsers. Smartphones have a built-in web browser app for the same purpose.
Source EFF
Web-based proxy Noun A website that lets its users access other, blocked or censored websites. Generally, the web proxy will let you type a web address (or URL) onto a web page, and then redisplay that web address on the proxy page. Easier to use than most other censorship-circumventing services.
Source EFF
WebApp Noun
Welcome Noun
WhisperBack Noun WhisperBack
WiFi Noun
Windows Noun Operating system ویندوز
World Wide Web Noun شبکه جهانی وب
XMPP Noun A open standard for instant messages - Google uses XMPP for Google Talk; Facebook used to offer it, but stopped. Non-corporate independent instant messaging services will usually use XMPP. Services like WhatsApp have their own, closed and secret protocol.
Source EFF
YYYY Noun “Year” Indicates that user must input a 4-digit year (ex: 1990)
Yes Noun
Zero day Noun A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers hear of the flaw and fix it, attackers can use it for their own purposes.
Source EFF
about Preposition [Globaleaks]
accept Verb
access Noun
access Verb
account Noun حساب کاربری
accountability Noun
acknowledge Verb [Peerio] An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment"
acknowledged Adjective [Peerio] An acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment"
acknowledgement Noun [Peerio] British English — A button in Peerio that functions similar to a message, but sends a "thumbs up" icon with a timestamp. The thumbs-up icon is referred to as an "acknowledgement"
acknowledgment Noun [Peerio] American English — A button in Peerio that functions similar to a message, but sends a "thumbs up" icon with a timestamp. The thumbs-up icon is referred to as an "acknowledgment"
acquire Verb به دست آوردن
active Adjective فعال
activity Noun فعالیت
ad-blocker Noun
add Verb
add-on Noun A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources.
Synonyms: extensions, plugins.
Source EFF
افزودنی
added Adjective
address Noun آدرس
address Noun
address bar Noun
addressbook Noun دفتر آدرس ها
advanced Adjective پیشرفته
advanced Search Noun
adversary Noun Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.
Source EFF
agent Noun
air gap Noun A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.
Source EFF
air gapped Adjective
air-gapped Adjective
allow Verb
alpha Noun
alternate Adjective
alternative Adjective
alternative Noun
ambiguous Adjective
and/or Conjunction
anomaly Noun [Globaleaks]
anonymity Noun
anonymization Noun "It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous."
https://en.wikipedia.org/wiki/Data_anonymization"
بی نام سازی
anonymize Verb To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous.
https://en.wikipedia.org/wiki/Data_anonymization"
گمنام
anonymous Adjective بی نام
app Noun Abbreviation of "application."
application Noun An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.
https://en.wikipedia.org/wiki/Application_software"
apply Verb اعمال کردن
approach Noun
approve Verb
archive Noun An archive file is a file that is composed of one or more computer files along with metadata. Archive files are used to collect multiple data files together into a single file for easier portability and storage, or simply to compress files to use less storage space.
https://en.wikipedia.org/wiki/Archive_file"
بایگانی
archive Verb To write a document from the internal memory onto an external media.
argument Noun
arrive Verb رسیدن
article Noun
attachment Noun File sent together with an email or other electronic message.
audio Noun
authenticate Verb
authenticated Adjective
authentication Noun
author Noun نویسنده
authorize Verb
automated traffic Noun
available Adjective در دسترس
avatar Noun * Real or fantasy character, persona representing a user or player in the virtual world
* A computer generated visual icon used as an alternative digital fingerprint.
Synonym: identicon
back Noun As in Back button پشت
back up Verb
background Noun Screen surface where text and graphic elements are displayed ,زمینه
backup Noun Copy of data, updated regularly or not, in order to allow restoration in case of data loss.
It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely."
پشتیبان
bandwidth Noun پهنای باند
bar Noun میله
bare-metal Adjective
big data Noun
binaries Noun
binary Noun
block Noun
block Verb
blocked Adjective مسدود
blocked access Noun دسترسی مسدود
blockfile Noun [I2P] Referring to the file format/name service.
https://geti2p.net/spec/blockfile"
blog Noun
blogging Noun
body Noun بدنه
bookmark Noun نشانک
boolean Noun
boot Verb
bootable Adjective
bootloader Noun
botnet Noun
bounce Verb
bounty Noun
box Noun
break in Noun
bridge Noun [Tor]
bridge Verb [Tor] پل
bridge line Noun [Tor] a line with the bridge configuration خط پل
bridge relay Noun [Tor]
bridge type Noun [Tor]
browse Verb
browser Noun web browser مرورگر
bug Noun اشکال
bug report Noun گزارش مشکل
bundle Noun
bundled Adjective
button Noun
bypass Verb گذرگاه
bytes Noun [Globaleaks]
cache Noun
cache Verb
cancel Noun لغو کردن
cancel Verb
cc Noun “carbon copy”
censorship Noun
certificate Noun گواهی نامه
certificate Verb To give a certificate
certificate authority
certificate authority Noun گواهی مجاز
certificate chain Noun [Globaleaks] زنجیره گواهی
certificate chain file Noun [Globaleaks]
certificates Noun
chain Noun زنجیر
change Verb
change log Noun
chart Noun نمودار
check Verb چک
checksum Noun
choke Verb
choose Verb
ciphertext Noun
circuit Noun مدار مدار، جریان
circuits Noun
circumvent Noun
circumvent Verb گیر انداختن
circumvention Noun دور زدن
clear Verb واضح
cleartext Noun
click Noun
click Verb کلیک
click Verb
click and hold Verb
clickjacking attack Noun
client Noun ارباب رجوع
clipboard Noun
close Verb بستن
cloud storage Noun
code Noun
codec Noun
collusion attack Noun
color Noun
command Noun
commandline Noun خط فرمان
comment Noun [Globaleaks]
communicate Verb
communication Noun
community Noun
community center Noun
compatible Adjective سازگار
complete Verb
completed Adjective
compose Verb
compressed Adjective
compression Noun فشرده سازی
compression/decompression tool Noun
compromise Verb
compromised Noun [Globaleaks]
computer Noun
concordance Noun مطابقت
conference Noun
confidentiality Adjective [Globaleaks]
configuration Noun [Globaleaks]
configure Verb
confirm Verb تأیید
connection Noun ارتباط
consensus Noun اجماع
contact request Noun
content Noun
context Noun [Globaleaks] Tips are classifies in contexts, e.g. corruption
control panel Noun صفحه کنترل
control port Noun درگاه واپایش
conversation Noun A "conversation" is the same as a message "thread"
cookie Noun [Globaleaks]
Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in.
Source EFF
copy Verb
create Verb
create Verb
credits Noun
cross-certification Noun
crucial Adjective بسیار سخت
curriculum for trainers Noun
custodian Noun [Globaleaks]
customer support Noun
cut Verb
daemon Noun
data Noun
data package Noun
datastore Noun http://en.wikipedia.org/wiki/Datastore_network
day Noun
debug Verb اشکال زدایی
debug mode Noun
debugging Noun
decline Verb
decompression Noun uncompression
decrypt Verb Make a secret message or data intelligible. The idea behind encryption is to make messages that can only be decrypted by the person or people who are meant to receive them.
Source EFF."
رمزگشایی
decrypted Adjective
decryption Noun
default Noun پیش فرض
delete Verb Delete removes a message/file from a user's account حذف
deleted Adjective حذف کردن
deprecated Adjective توصیه
desktop Noun
destroy Verb Removes message/file from the entire Peerio server and all users' accounts
detail Noun
device Noun دستگاه
devices Noun دستگاه های
dialog Noun
directory Adverb دایرکتوری
disable Verb
disabled Adjective
disabled Verb
discussion Noun
domain Noun An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube. دامنه
download Noun [Globaleaks]
download Verb [Globaleaks]
draft Noun
drafts Noun
drag Verb
drop-down list Noun
dual boot Noun
edit Verb
eepsite Noun
email Noun Synonym: e-mail
email identity Noun Synonym: e-mail identity
email provider Noun ارائه دهنده ایمیل
email, e-mail Noun Synonym: e-mail ایمیل
embedded Adjective
enable Verb
encoded Adjective
encrypt Verb To apply encryption technology to any sort of information or communication. This transforms the information or communication mathematically so that it seems meaningless, but can still be restored to its original form by a person or device that possesses the right secret key. This limits who can access the information because without the right secret key, it should be impossible to reverse the encryption and recover the original information. Encryption is one of several technologies that make up the field called cryptography.
Source EFF
رمزگذاری ویکی‌پدیا
encrypted Adjective رمزگذاری
encrypted persistent storage Noun
encryption Noun رمزگذاری
end-to-end Conjunction نظیر به نظیر
end-to-end encryption Noun End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption.
Source EFF
enter Verb
error Noun خطا
event log Noun
exception Noun
exchange Verb
executable Noun
exit Noun
exit Verb خروج
exit relay Noun رله خروجی
exited Verb خارج
experience Verb
expiration Noun
expiration date Noun
expiry Noun [Globaleaks]
export Verb برون‌ریزی
extend Verb [Globaleaks]
extract Verb استخراج کردن
failed Adjective
failed Verb
feature Noun امکان، قابلیت
feature set Noun
feed Noun
fetch Verb
field Noun
field, fields Noun فیلد، فیلدها
file Noun پرونده
file attachment Noun [Globaleaks]
file sharing Noun
filter Noun
find Verb
fingerprint Noun The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits.  So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.
Source EFF."
اثر انگشت
fingerprint identification Noun
fix Noun
fix Verb درست کردن
floodfill Noun سیل آسا
floodfill peer Noun گره سیل آسا
folder Noun پوشه
follow Verb
fragment Noun
free Adjective
full restricted route Noun
gateway Noun
general Adjective عمومی
generate Verb As in "generate key"
generation Noun
generation Noun
geo-location Noun
get Verb گرفتن
go Verb رفتن
go back Adverb
goal Noun
guard relay Noun
handshake Noun Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place. لرزش دست
header Noun
help Noun کمک
help Verb
hidden volume Noun [VeraCrypt]
hide Verb پنهان پنهان کردن
history Noun تاریخچه
home directory Noun خانه
host Noun [Globaleaks]
hostname Noun نام میزبان
hostnames Noun نام هاست ها
hour Noun
human rights Noun
i.e. Noun
ice breakers Noun
icon Noun
identity Noun هویت
ignore Verb چشم پوشی
illustrated Adverb
image Noun
import Verb درون‌ریزی
improve Verb بهبود
in-transit encryption Noun
inbox Noun
include Verb شامل
incognito Noun
incompatible Adjective نا سازگار
incremental Adjective
info Noun اطلاعات
informator Noun [Globaleaks]
input Noun ورودی
input Verb [Globaleaks]
install Verb
installation Noun نصب
installer Noun
interface Noun
interrupt Verb
intranet Noun اینترانت
isolate Verb
isolation Noun
issue Noun
issues Noun مسائل
jar Noun “A JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.” (https://en.wikipedia.org/wiki/JAR_(file_format)) jar
jump service link Noun
kernel Noun
key Noun In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message.
Source EFF
[Globaleaks]
key code Noun [Globaleaks]
key id Noun شناسه کلیدی
key list Noun
key owner Noun
key pair Noun To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a "key pair."
Source EFF.
Synonym: keypair
key password Noun
key size Noun
keychain Noun
keyring Noun If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring.
Source EFF."
دسته کلید
keyserver Noun سرور کلید
keywords Noun
kidnapping Noun
label Noun برچسب
launch Noun راه اندازی
law enforcement Noun
library Noun Refers to a "library" in computing
licence Noun
license Noun پروانه
license Noun گواهینامه
line-of-sight Noun
link Noun
live Adverb زنده
load Verb [Globaleaks]
locate Noun
location Noun محل
lock Verb
lock icon Noun
log Verb ثبت کردن وقایع
log in Verb
logged in Adjective [Globaleaks]
login Noun [Globaleaks] ورود
logo Noun
logout Noun خروج از برنامه
logs Noun ثبت کردن وقایع
long Adjective [Globaleaks]
low latency Noun
machine learning Noun
mail Noun
mailbox Noun
mailboxes Noun
mailing list Noun
main menu Noun
maintain Verb نگه داشتن
manifest Noun
manual Adjective
master key Noun
match Verb
menu bar Noun نوار منو
message Noun
message body Noun متن پیام
message thread Noun Alternative to "conversation"
messaging Noun
metadata Noun فراداده، متا دیتا
miniLock Noun
ministreaming library Noun [I2P]
minute Noun
mirror Noun اینه
miscellaneous Adjective متفرقه
mobile Adjective
mobile notifications Noun
mobile number Noun
modal Adjective
mode Noun [Globaleaks]
module Noun
month Noun
mount Verb سوار کردن
mouse Noun ماوس
move Verb
multi-boot Noun
name Noun نام
nameserver Noun
neighborhood Noun
networking Noun
new Adjective جدید
nickname Noun
note Noun نکته
notification Noun
obfuscate Verb
offline Adjective
onion service Noun [Tor]
online Adjective
open Verb باز
open-source Adjective
opened Verb باز
operator Noun
optical Adjective بصری
optimization Noun
option Noun گزینه
order Verb [Globaleaks]
organize Verb سازمان دادن
other Adjective
outer volume Noun
output Noun خروجی
overlay Noun
owner Noun مالک
ownership Noun مالکیت
package Noun بسته
package manager Noun
paper Noun
paravirtualization Noun "Paravirtualization" An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.
parent Adjective
parse Verb تجزیه کردن
part Noun بخش قسمت
partial Adjective
partially Adverb
partition Noun "Disk partitioning or disk slicing[1] is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately." -https://en.wikipedia.org/wiki/Disk_partitioning
passcode Noun A user-chosen and device-specific password
passphrase Noun A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/
Source EFF
[Peerio] A computer-generated set of 6-10 random words used as the primary authentication for Peerio accounts."
کلمه عبور
password Noun A secret meant to be memorized, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a "passphrase" to remind us that it's not just one "word." A main password to unlock other passwords in a password manager or password safe application is often called a "master password.”
Source EFF
رمز عبور
paste Noun
path Noun مسیر
peer Noun
peer reviewed Adjective
peers Noun
pending Adjective
penetration test Noun
perceived performance Noun
performance Noun
permissions Noun
persistence Adjective اصرار
persistence partition Noun پارتیشن تداوم
persistent Adjective مداوم
persistent overlay Noun پوشش مداوم
persistent storage Noun
persistent volume Noun حجم مداوم
persstent storage Noun
phishing Noun
physical surveillance Noun
ping Noun [Globaleaks]
plain text Noun
policies Noun
policy Noun
popup Noun
popup window Noun
port Noun [Globaleaks] درگاه
portable Adjective قابل حمل
postponed Adjective [Globaleaks]
predecessor attack Noun
preference Noun [Globaleaks]
preferences Noun [Globaleaks] تنظیمات
preferences page Noun [Globaleaks]
prevent Verb
preview Noun [Globaleaks]
privacy Noun
privacy notice Noun
privacy officer Noun
private Adjective
private key (secret key) Noun کلید خصوصی
privoxy Noun
probing Verb کاوش
process Noun
process Verb
processed Adjective
profile Noun
program Noun برنامه
properly Adverb به درستی
prototype Noun
proxied Adjective پروکسی
proxied site Noun
proxy Noun پروکسی
proxy test Noun پروکسی تست
public account ID Noun The Martus account's public identifier شناسه عمومی حساب کاربری
public code Noun کد عمومی
public key Noun کلید عمومی
public key / public account key Noun [Martus]
The Martus account's public key"
کلید عمومی
public key infrastructure Noun
publish Verb
pull Noun 9
pull Verb In the context of commits (GitHub, GitLab etc.)
qube Noun [QubesOS] A user-friendly term for a VM in Qubes OS.
quit Verb خارج شدن
range Noun [Globaleaks]
read-only Adjective
receipt Noun [Globaleaks]
receive Verb
receiver Noun [Globaleaks]
recipient Noun [Globaleaks] گیرنده
recipients Noun
recommend Verb توصیه
reconnect Verb دوباره متصل شدن
record Noun
record Verb
recover Verb
reenter Verb
referral code Noun
register Verb
regular Adjective
regular expression Noun
relay Noun
relay Verb رله
relay directory Noun
relay node Noun
release Noun release رهایی، پخش
release Verb
release candidate Noun
reload Verb بارگذاری مجدد
remaining Adjective باقی مانده
remove Verb
rename Verb تغییر نام
render Verb
rendering Adjective
rendering Noun
report Noun گزارش
report Verb گزارش دادن
repository Noun مخزن نرم افزار
request Noun درخواست
rescan Verb
resending Noun ارسال مجدد
reset Verb تنظیم مجدد
resetting Noun بازنشانی
resolver Noun
restart Noun شروع دوباره
restart Verb
restore Verb
restricted route Noun مسیریاب محدود
restriction Noun محدودیت
retrieve Verb (from server)
review Verb مرور
revision Noun تجدید نظر
revokation certificate Noun گواهی لغو کردن
revoke Verb
revoked Adjective
role Noun [Globaleaks]
rooftop Noun
room Noun
root Adjective ریشه
root domain Noun
route Noun
route Verb (wikipedia usa encaminar, pero encaminamiento no nos gustó)
router Noun روتر
router console Noun صفحه کنسول مسیریاب
routeur family Noun
routing Noun
row Noun
rule Noun
ruleset Noun مجموعه دستور
run Verb
sandbox Noun
save Verb ذخیره
scan Verb
scope Noun [Globaleaks]
scour Verb scour
scroll bar Noun نوار اسکرول
search Verb جستجو
search index Noun
second Noun
secure Adjective امن
secureApp Noun Name of the application.
securely Adverb ایمن
security Noun امنیت
security background Noun
security level Noun
security log Noun
select Verb
selected Adjective
selection Noun
selector Noun [Globaleaks]
send Verb
separate
separate Adjective
server Noun سرور
service Noun
session Noun
set Noun set
set Verb set
set up Verb
setup Noun نصب
share Noun
share Verb
show Verb
shut down Verb بستن تعطیل کردن
shutdown Noun خاموش تعطیل
shutdown Verb
shutting down Verb [Globaleaks]
sidebar Noun
sign Verb علامت
signature Noun امضا
signed Adjective
signing key Noun
signup form Noun
site Noun Website
site operator Noun
size Noun اندازه
smartphones Noun گوشی های هوشمند
software Noun نرم افزار
source Noun منبع
spam Noun
specify Verb
split Verb جدا
split GPG Noun "Split GPG" is the name of a feature. For reference: https://www.qubes-os.org/doc/split-gpg/
split bar Noun نوار تقسیم
split package Noun بسته تقسیم
sponsor Noun
sponsor Verb
spoof Verb
spoofing Noun حقه بازی
spooled Adjective [Globaleaks] context: spooled emails
spreadsheet Noun
standalone Adjective
standard Noun
start Noun
start Verb شروع
startup Noun شروع
state Noun
statistics Noun
status Noun [Globaleaks] وضعیت
storage Noun
stores Noun
stream Noun جریان
streaming library Noun
strip Verb
subject Noun
subkey Noun
submission Noun [Globaleaks]
submit Verb ثبت کردن
submitter Noun [Globaleaks]
subscription Noun
suggested Adjective
suggestion Noun
suitable Adjective مناسب
summary Noun
superuser Noun
support Noun پشتیبانی
support Verb پشتیبانی کردن
supported Adjective پشتیبانی شده
surveillance Noun
swarm Noun
switch Noun
sync Verb
synthesis Noun Repaso y conclusión. En plural es Síntesis también.
sys-firewall Noun
system's clock Noun ساعت سیستم
tab Noun برگه
tag Noun تگ
tag Verb
tagging attack Conjunction http://www.i2p2.de/how_threatmodel.html#tagging
tap Verb
tarball Noun
target Noun هدف
task bar Noun نوار ابزار
taskbar Noun
team Noun
template Noun
template-based VM Noun [QubesOS] "Template-Based Virtual Machine"Any VM which depends on a TemplateVM for its root filesystem.
terminal Noun
terms of service Noun
test bed Noun تخت آزمون
text area Noun
text format Noun
theme Noun
third-party Adjective
thread Noun A message "thread" is also a "conversation"
throttling Noun
thumbnail Noun
thumbs up icon Noun As in the emoji called by "(y)" or ":thumbsup:"
ticket Noun
time out Verb
timeout Noun اتمام وقت
timestamp Noun
timezone Noun منطقه زمانی
timing attack Noun
tip Noun
title Noun
title bar Noun نوار عنوان
toggle Noun
toggle Verb To switch back and forth between two options (ex: on/off)
token Noun
tool Noun ابزار
toolbar Noun
tools Noun ابزار
torify Verb
tortification Noun
tracker Noun
traffic Noun ترافیک
traffic analysis attack Conjunction
trainer Noun
training Noun (awareness raising session - concientización, sensibilización)
trash Noun نخاله
trashcan icon Noun
tray Noun
troubleshooting Noun
trust Noun اعتماد
tunnel Noun
tunnel Verb
tunneling Adjective
tunneling Noun
turn off Verb
turn on Verb
tweet Noun
tweet Verb
type Verb
unable Verb
unabled Adjective ناتوان
unavailable Adjective
uncheck Verb لغو انتخاب
unchoke Verb
unexpected Adjective
unfollow Verb
uninstall Verb
unit test Noun http://en.wikipedia.org/wiki/Unit_test
unknown Adjective ناشناخته
unlock Verb
unlocked Adjective
unmount device Verb unmount_device
unmount, unmounting Verb unmount, unmounting
unpack Verb باز کردن
unparseable Adjective Unparseable
unreachable Adjective قابل دسترسی
unrecognized Adjective
unsafe Adjective نا امن
untrusted Adjective
up-to-date Adjective به روز رسانی
update Noun
update Verb به روز رسانی
upgrade Noun ارتقاء
upgrade Verb
upload Noun
upload Verb بارگذاری
uploader Noun
uploading Noun
upstream proxy Noun
uptime Noun
user Noun
user ID Noun user identification
user agent
user agent Noun
user data Noun
user guide Noun راهنمای کاربر
user manual Noun راهنمای کاربری
user settings Noun تنظیمات کاربر
username Noun نام کاربری
variable Noun
vcard, v-card Noun
verification Noun تایید
verified Adjective
verify Verb بررسی
versioned Adjective
video chat Noun
view Noun
view Verb دیدن
viewport Noun
virtual machine Noun A software implementation of a machine (for example, a computer) which executes programs like a physical machine.
volume Noun حجم
volunteer Noun
vulnerability Noun
vulnerable Adjective
wallet Noun کیف پول
warning Noun هشدار
watch Verb
watch list Noun
watermark Noun
web connectivity Noun
web interface Noun
webmail provider Noun
website Noun وبسایت
week Noun
whistleblower Noun [Globaleaks]
whistleblowing Noun [Globaleaks]
whitelist Noun
whole device Noun As in “whole device encryption.”
wildcards Noun
window Noun
wipe Verb
wizard / assistant Noun A “getting started” wizard / assitant ویزارد
work Verb
work-around Noun کار-در سراسر
wrapper Noun
year Noun
you (plural, formal) Pronoun
you (plural, informal) Pronoun
you (singular, formal) Pronoun
you (singular, informal) Pronoun
your Adjective
your (plural, formal) Adjective
your (plural, informal) Adjective
your (singular, formal) Adjective
your (singular, informal) Adjective
Conjunction Punctuation, not a conjunction, however “punctionation” is not an option in Transifex