Other components
Component | Translated | Unfinished | Unfinished words | Unfinished characters | Untranslated | Checks | Suggestions | Comments | |
---|---|---|---|---|---|---|---|---|---|
Understanding and Circumventing Network Censorship CC0-1.0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
How to: Enable Two-factor Authentication
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
Seven Steps To Digital Security
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
Choosing Your Tools
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
How to: Use KeePassXC
|
0 | 0 | 0 | 0 | 33 | 0 | 0 | ||
|
|||||||||
Animated Overview: Using Password Managers to Stay Safe Online
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
Overview
Project website | ssd.eff.org |
---|---|
Instructions for translators | Please see Localized Guides by Localization Lab available in PDF files. Some of the guides are already localized and may just need to be updated. Do not translate the values inside HTML elements except for: - data-title - data-content - data-original-title |
Translation license | Creative Commons Zero v1.0 Universal |
Translation process |
|
Source code repository |
[email protected]:eml10n/ssd.eff.org.git
|
Repository branch | main |
Last remote commit |
Translated using Weblate (Indonesian)
8d2aaa8
![]() |
Last commit in Weblate |
Translated using Weblate (Indonesian)
04b6572
![]() |
Weblate repository |
https://l10n.space/git/ssd/understanding-and-circumventing-network-censorship/
|
File mask | */glossary/index.html |
Monolingual base language file | en/glossary/index.html |
Translation file |
Download
id/glossary/index.html
|
Last change | March 30, 2023, 11:15 a.m. |
Last author | iel628 |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 89 | 21,910 | 194,300 | |||
Approved | 0% | 0 | 0% | 0 | 0% | 0 |
Waiting for review | 95% | 85 | 99% | 21,894 | 99% | 194,038 |
Translated | 100% | 89 | 100% | 21,910 | 100% | 194,300 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 4% | 4 | 1% | 16 | 1% | 262 |
Failing checks | 8% | 8 | 11% | 2,578 | 11% | 23,314 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 0% | 0 | 0% | 0 | 0% | 0 |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
|
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/record">Off-the-Record</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>Instant messaging systems are often unencrypted. <a href="/en/glossary/record" class="glossify-link" data-title="Off-the-Record" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Instant messaging systems are often unencrypted. Off-the-Record Messaging (OTR) is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat or Google Chat or Hangouts but with your messages more resistant to surveillance. " data-original-title="Off-the-Record">Off-the-Record<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> Messaging (<a href="/en/glossary/record" class="glossify-link" data-title="OTR" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Instant messaging systems are often unencrypted. Off-the-Record Messaging (OTR) is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat or Google Chat or Hangouts but with your messages more resistant to surveillance. " data-original-title="OTR">OTR<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) is a way of adding <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> to them, so that you can keep using familiar networks like Facebook chat or Google Chat or Hangouts but with your messages more resistant to surveillance.</p> </div> </div> </div> <div class="views-row views-row-49 views-row-odd">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/record">Off-the-Record</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p> </div> </div> </div> <div class="views-row views-row-49 views-row-odd"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/master-password">Master password</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>A <a href="/en/glossary/password" class="glossify-link" data-title="password" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A secret meant to be memorized or otherwise protected and kept private, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a "passphrase" to remind us that it's not just one "word." A master password is a main password used to unlock other passwords in a password manager or password safe application. " data-original-title="password">password<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a <a href="/en/glossary/master-password" class="glossify-link" data-title="master password" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can. " data-original-title="master password">master password<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> as strong as you can.</p> </div> </div> </div> <div class="views-row views-row-47 views-row-odd">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/master-password">Master password</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>A <a href="/en/glossary/password" class="glossify-link" data-title="password" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content=" </div> </div> </div> <div class="views-row views-row-47 views-row-odd"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/one-time-password">One-time password</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some <a href="/en/glossary/one-time-password" class="glossify-link" data-title="one-time password" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a keylogger on a system where you have to type in a password. " data-original-title="one-time password">one-time password<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a <a href="https://ssd.eff.org/en/glossary/keylogger">keylogger</a> on a system where you have to type in a <a href="/en/glossary/password" class="glossify-link" data-title="password" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A secret meant to be memorized or otherwise protected and kept private, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a "passphrase" to remind us that it's not just one "word." A master password is a main password used to unlock other passwords in a password manager or password safe application. " data-original-title="password">password<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> </div> </div> </div> <div class="views-row views-row-50 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/one-time-password">
<div class="views-field views-field-description-field"> <div class="field-content"><p> </div> </div> </div> <div class="views-row views-row-50 views-row-even"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/man-middle-attack">Man-in-the-middle attack</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>A type of <a href="/en/glossary/attack" class="glossify-link" data-title="attack" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, an attack is a method that can be used to compromise security. An attacker is the person or organization using an attack. An attack is sometimes called an "exploit." " data-original-title="attack">attack<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> where an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> intercepts communications sent between you and your intended recipient, then sends them on after interception, so that neither you nor the recipient know there is a “man (or machine) in the middle.” Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the <a href="/en/glossary/man-middle-attack" class="glossify-link" data-title="man-in-the-middle attack" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A type of attack where an adversary intercepts communications sent between you and your intended recipient, then sends them on after interception, so that neither you nor the recipient know there is a “man (or machine) in the middle.” Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against adversaries who have control of any part of the Internet between two communicators. As an example, suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. " data-original-title="man-in-the-middle attack">man-in-the-middle attack<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> to be safe against adversaries who have control of any part of the Internet between two communicators.</p> <p>As an example, suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack.</p> </div> </div> </div> <div class="views-row views-row-46 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/man-middle-attack">Man-in-the-middle attack</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>A type of <a href="/en/glossary/attack" class="glossify-link" data-title="attack" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content=" <p>As an example, suppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack </div> </div> </div> <div class="views-row views-row-46 views-row-even"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="PGP">PGP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/pgp" class="glossify-link" data-title="Pretty Good Privacy" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="Pretty Good Privacy">Pretty Good Privacy<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was one of the first popular implementations of <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key cryptography" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key cryptography">public key cryptography<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key encryption">public key encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was a violation of U.S. law.</p> <p>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP <a href="/en/glossary/key" class="glossify-link" data-title="key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. " data-original-title="key">key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>” or sending a “PGP message”, even if they are using GnuPG.</p> </div> </div> </div> <div class="views-row views-row-58 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP atau Pretty Good Privacy adalah salah satu implementasi kriptografi public key yang pertama kali populer. Pembuatnya, Phil Zimmermann, membuat program ini pada tahun 1991 untuk membantu para aktivis dan pihak lainnya dalam melindungi komunikasi mereka. Beliau mengalami penyidikan resmi oleh pemerintah AS ketika program tersebut menyebar ke luar Amerika Serikat. Pada saat itu, mengekspor alat perangkat lunak yang mengandung enkripsi public key yang kuat adalah pelanggaran terhadap perundang-undangan AS. PGP tetap eksis dan berlanjut sebagai produk perangkat lunak komersial. Implementasi gratis yang berdasarkan standar yang sama dengan PGP disebut GnuPG (atau GPG) juga tersedia. Karena keduanya menggunakan pendekatan yang sama dan dapat saling dipertukarkan, orang akan menyebutkan penggunaan “key PGP” atau mengirimkan “pesan PGP”, meski yang mereka gunakan sebenarnya adalah GnuPG. " data-original-title="PGP">PGP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/pgp" class="glossify-link" data-title="Pretty Good Privacy" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP atau Pretty Good Privacy adalah implementasi kriptografi public key yang pertama kali populer. Pembuatnya, Phil Zimmermann, membuat program ini pada tahun 1991 untuk membantu para aktivis dan pihak lainnya dalam melindungi komunikasi mereka. Beliau mengalami penyidikan resmi oleh pemerintah AS ketika program tersebut menyebar ke luar Amerika Serikat. Pada saat itu, mengekspor alat perangkat lunak yang mengandung enkripsi public key yang kuat adalah pelanggaran terhadap perundang-undangan AS. PGP tetap eksis dan berlanjut sebagai produk perangkat lunak komersial. Implementasi gratis yang berdasarkan standar yang sama dengan PGP disebut GnuPG (atau GPG) juga tersedia. Karena keduanya menggunakan pendekatan yang sama dan dapat saling dipertukarkan, orang akan menyebutkan penggunaan “key PGP” atau mengirimkan “pesan PGP”, meski yang mereka gunakan sebenarnya adalah GnuPG. " data-original-title="Pretty Good Privacy">Pretty Good Privacy<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> adalah salah satu implementasi <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="kriptografi public key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sistem enkripsi traditional menggunakan informasi rahasia, atau key, yang sama untuk mengenkripsi atau mendekripsi sebuah <p>PGP tetap eksis dan berlanjut sebagai produk perangkat lunak komersial. Implementasi gratis yang </div> </div> </div> <div class="views-row views-row-58 views-row-even"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="PGP">PGP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/pgp" class="glossify-link" data-title="Pretty Good Privacy" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="Pretty Good Privacy">Pretty Good Privacy<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was one of the first popular implementations of <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key cryptography" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key cryptography">public key cryptography<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key encryption">public key encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was a violation of U.S. law.</p> <p>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP <a href="/en/glossary/key" class="glossify-link" data-title="key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. " data-original-title="key">key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>” or sending a “PGP message”, even if they are using GnuPG.</p> </div> </div> </div> <div class="views-row views-row-58 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP atau Pretty Good Privacy adalah salah satu implementasi kriptografi public key yang pertama kali populer. Pembuatnya, Phil Zimmermann, membuat program ini pada tahun 1991 untuk membantu para aktivis dan pihak lainnya dalam melindungi komunikasi mereka. Beliau mengalami penyidikan resmi oleh pemerintah AS ketika program tersebut menyebar ke luar Amerika Serikat. Pada saat itu, mengekspor alat perangkat lunak yang mengandung enkripsi public key yang kuat adalah pelanggaran terhadap perundang-undangan AS. PGP tetap eksis dan berlanjut sebagai produk perangkat lunak komersial. Implementasi gratis yang berdasarkan standar yang sama dengan PGP disebut GnuPG (atau GPG) juga tersedia. Karena keduanya menggunakan pendekatan yang dapat saling dipertukarkan, orang akan menyebutkan penggunaan “key PGP” atau mengirimkan “pesan PGP”, meski yang mereka gunakan sebenarnya adalah GnuPG. " data-original-title="PGP">PGP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/pgp" class="glossify-link" data-title="Pretty Good Privacy" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP atau Pretty Good Privacy adalah implementasi kriptografi public key yang pertama kali populer. Pembuatnya, Phil Zimmermann, membuat program ini pada tahun 1991 untuk membantu para aktivis dan pihak lainnya dalam melindungi komunikasi mereka. Beliau mengalami penyidikan resmi oleh pemerintah AS ketika program tersebut menyebar ke luar Amerika Serikat. Pada saat itu, mengekspor alat perangkat lunak yang mengandung enkripsi public key yang kuat adalah pelanggaran terhadap perundang-undangan AS. PGP tetap eksis dan berlanjut sebagai produk perangkat lunak komersial. Implementasi gratis yang berdasarkan standar yang sama dengan PGP disebut GnuPG (atau GPG) juga tersedia. Karena keduanya menggunakan pendekatan yang dapat saling dipertukarkan, orang akan menyebutkan penggunaan “key PGP” atau mengirimkan “pesan PGP”, meski yang mereka gunakan sebenarnya adalah GnuPG. " data-original-title="Pretty Good Privacy">Pretty Good Privacy<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> adalah salah satu implementasi <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="kriptografi public key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sistem enkripsi traditional menggunakan informasi rahasia, atau key, yang sama untuk mengenkripsi atau mendekripsi sebuah message. Jadi, jika Anda mengenkripsi sebuah file dengan kata sandi "bluetonicmonster," Anda akan membutuhkan file dan kata sandi "bluetonicmonster" untuk mendekodenya. Enkripsi public key menggunakan dua key: satu key untuk mengenkripsi dan key lain untuk mendekripsi. Cara ini menimbulkan berbagai manfaat. Salah satunya berarti bahwa Anda dapat membagikan key untuk mengenkripsi pesan yang ditujukan kepada Anda, dan selama Anda menjaga kerahasiaan key yang lain, siapa pun dengan key tersebut dapat berkomunikasi dengan Anda secara aman. Key yang Anda bagikan kepada banyak orang disebut "public key": yang juga menjadi nama tekniknya. Enkripsi public key digunakan untuk mengenkripsi email dan file dengan menggunakan Pretty Good Privacy (PGP), OTR untuk perpesanan instan, dan SSL/TLS untuk berselancar di web. " data-original-title="public key cryptography">kriptografi public key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Pembuatnya, Phil Zimmermann, membuat program tersebut pada tahun 1991 untuk membantu para aktivis dan pihak lain dalam melindungi komunikasi mereka. Beliau mengalami penyidikan resmi oleh pemerintah AS ketika program tersebut menyebar ke luar Amerika Serikat. Pada saat itu, mengekspor alat perangkat lunak yang mengandung <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sistem enkripsi tradisional menggunakan informasi rahasia, atau key, yang sama untuk mengenkripsi atau mendekripsi sebuah pesan. Jadi, jika saya mengenkripsi sebuah file dengan kata sandi "bluetonicmonster," Anda akan membutuhkan file dan kata sandi "bluetonicmonster" untuk mendekodenya. Enkripsi public key menggunakan dua key: satu key untuk mengenkripsi dan key yang lain untuk mendekripsi. Cara ini menimbulkan berbagai manfaat. Salah satunya berarti bahwa Anda dapat membagikan key yang digunakan untuk mengenkripsi pesan yang ditujukan kepada Anda, dan selama Anda menjaga kerahasiaan key yang lain, siapa pun dengan key tersebut dapat berkomunikasi dengan Anda secara aman. Key yang Anda bagikan kepada banyak orang disebut "public key": yang juga adalah nama tekniknya. Enkripsi public key digunakan untuk mengenkripsi email dan file dengan menggunakan Pretty Good Privacy (PGP), OTR untuk perpesanan instan, dan SSL/TLS untuk berselancar di web. " data-original-title="public key encryption">enkripsi public key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> adalah pelanggaran terhadap perundang-undangan AS.</p> <p>PGP </div> </div> </div> <div class="views-row views-row-58 views-row-even"> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/keyring">Keyring</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>If you use <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key cryptography" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key cryptography">public key cryptography<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, you'll need to keep track of many keys: your secret, private <a href="/en/glossary/key" class="glossify-link" data-title="key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. " data-original-title="key">key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your <a href="/en/glossary/keyring" class="glossify-link" data-title="keyring" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring. " data-original-title="keyring">keyring<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> </div> </div> </div> <div class="views-row views-row-44 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/keyring">Keyring</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p>If you use <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key cryptography" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content=" </div> </div> </div> <div class="views-row views-row-44 views-row-even"> |
![]() New contributor Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
New contributor
5 hours ago
|
![]() Translation changed Surveillance Self-Defense (Extracts) / Glossary (ssd.eff.org/en/glossary) — Indonesian |
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="PGP">PGP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/pgp" class="glossify-link" data-title="Pretty Good Privacy" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP or Pretty Good Privacy was one of the first popular implementations of public key cryptography. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong public key encryption was a violation of U.S. law. PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP key” or sending a “PGP message”, even if they are using GnuPG. " data-original-title="Pretty Good Privacy">Pretty Good Privacy<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was one of the first popular implementations of <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key cryptography" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key cryptography">public key cryptography<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Phil Zimmermann, its creator, wrote the program in 1991 to help activists and others protect their communications. He was formally investigated by the U.S. government when the program spread outside the United States. At the time, exporting tools that included strong <a href="/en/glossary/public-key-encryption" class="glossify-link" data-title="public key encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Traditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster," you would need both the file and the password "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for instant messaging, and SSL/TLS for web browsing. " data-original-title="public key encryption">public key encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> was a violation of U.S. law.</p> <p>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP <a href="/en/glossary/key" class="glossify-link" data-title="key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. " data-original-title="key">key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>” or sending a “PGP message”, even if they are using GnuPG.</p> </div> </div> </div> <div class="views-row views-row-58 views-row-even">
<div class="views-field views-field-name-field"> <div class="field-content"><a href="/en/glossary/pgp">PGP</a></div> </div>
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/pgp" class="glossify-link" data-title="PGP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="PGP <p>PGP continues to exist as a commercial software product. A free implementation of the same underlying standard that PGP uses called GnuPG (or GPG) is also available. Because both use the same interchangeable approach, people will refer to using a “PGP <a href="/en/glossary/key" class="glossify-link" data-title="key" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. " data-original-title="key">key<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>” or sending a “PGP message”, even if they are using GnuPG.</p> </div> </div> </div> <div class="views-row views-row-58 views-row-even"> |
89 | File in original format as translated in the repository | Plain text file | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
89 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/metadata" class="glossify-link" data-title="Metadata" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Metadata (or "data about data") is data that describes a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. " data-original-title="Metadata">Metadata<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (or "<a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> about data") is data that describes a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes.</p>
</div> </div> </div>
<div class="views-row views-row-48 views-row-even">
<div class="views-field views-field-description-field"> <div class="field-content"><p><a href="/en/glossary/metadata" class="glossify-link" data-title="Metadata" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Metadata (or "data about data")
is data that describes a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person'sadalah data yang mewakili sepotong informasi, selain dari informasi itu sendiri. Jadi, isi pesan bukanlah metadata, tetapi siapa yang mengirimkannya, kapan, dari mana, dan kepada siapa, semuanya adalah contoh metadata. Sistem hukum seringkali lebih melindungi konten daripada metadata: misalnya, di Amerika Serikat, penegak hukum memerlukan surat perintah untuk mengangkat panggilan telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deseseorang, tetapi mengklaim hak untuk mendapatkan daftar orang yang Anda hubungi jauh lebih mudah. Namun, metadata seringkali dapat mengungkapkan banyak hal, dand will often need to be protected as carefully as the data itseringkali perlu dilindungi dengan hati-hati seperti data yang didesckribespsikan. " data-original-title="Metadata">Metadata<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (or "<a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in aSetiap jenis informasi, biasanya disimpan dalam bentuk digitalform. Datacan includedapat mencakup dockuments, pictures, keys, gambar, kunci, programs,mpessagesan, dand other digital information or filesinformasi atau file digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> about data")is data that describes a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person'sadalah data yang mewakili sepotong informasi, selain dari informasi itu sendiri. Jadi, isi pesan bukanlah metadata, tetapi siapa yang mengirimkannya, kapan, dari mana, dan kepada siapa, semuanya adalah contoh metadata. Sistem hukum seringkali lebih melindungi konten daripada metadata: misalnya, di Amerika Serikat, penegak hukum memerlukan surat perintah untuk mengangkat panggilan telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deseseorang, tetapi mengklaim hak untuk mendapatkan daftar orang yang Anda hubungi jauh lebih mudah. Namun, metadata seringkali dapat mengungkapkan banyak hal, dand will often need to be protected as carefully as the data itseringkali perlu dilindungi dengan hati-hati seperti data yang didesckribespsikan.</p></div> </div> </div>
<div class="views-row views-row-48 views-row-even">