From: Silvan Jegen Date: Thu, 26 Jun 2014 17:33:24 +0000 (+0200) Subject: ja: start to fill in the index.html X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=3cba946042cc944b489ffc3a121bb5e377577a4d;p=enc.git ja: start to fill in the index.html --- diff --git a/ja/index.html b/ja/index.html index 235032ab..de142c3f 100644 --- a/ja/index.html +++ b/ja/index.html @@ -22,7 +22,7 @@ @@ -63,11 +63,11 @@

- We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us. + Free Software Foundationはパソコンのユーザの権利のために戦って、(自由の)のフリーソフトウェアの開発を促進します。無差別な監視に抵抗するのは我々にとって非常に大切なことです。

- We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal? + Free Software Foundationはこのようなツールをオンラインでもオフラインでも活躍的に促進して、自分のプライバシーを守るためにできるだけ多くの人のフリーソフトウェアへのフリーソフトウェアの使用の第一歩を支援しようと思っています。どうぞFree Software Foundationを支援して、会員になってください。

@@ -79,12 +79,14 @@

- View & share our infographic → - Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

+ View & share our infographic → + 無差別な監視は人権の侵害であり、言論の自由と対立するものです。このガイドでは、このような監視に対する自衛手段としてメールの暗号化を説明します。このガイドを読み終えれば、監視エージェントやデータ泥棒には読めないメールを送受信することができるようになります。必要なのはインターネットに接続できるパソコンとメールアカウントの他には、ほんの30分ほどです。 +

-

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

-

In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. Let's get started!

+

何も隠そうと思うものがなくても、暗号化技術を使えば相手のプライバシーを守り、無差別監視システムによる侵害を困難にします。もし大事で隠すべき何かをお持ちなら、頼りになるツールがすでにあります。このツールはエドワード・スノーデンが貴重な秘密情報を報道機関に送るためにも使ったものです。

+ +

監視に抵抗するには暗号化の他にも政治的な行動によって我々について収集されるデータ減らす必要があります。その重要な第一歩としてまずあなた自身を守り、あなたを監視されにくくするのです。では始めましょう!

@@ -96,11 +98,12 @@
-

#1 Get the pieces

-

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

+

#1 必要な部品を集めよう

+

このガイドで登場するソフトウェアは自由なソフトウェアライセンスに基づいています。そのようなソフトは完全な透明性があり、誰でもコピーができ、自分だけのバーションを作ることもできます。そういう特徴があるため、フリーソフトウェアライセンスのソフト(短くフリーソフト)は(Windowsのような)プロプライエタリソフト、つまりは売っている会社だけが中身を知っているようなソフトよりよほど監視しにくいのです。詳しくはfsf.orgをご覧ください。

+ +

GNU/LinuxのオペレーティングシステムはほとんどにあらかじめGnuPGがインストールされているので、ダウンロードする必要はありません。でもGnuPGを設定する前に、デスクトップ用のメールプログラムをインストールしなければならないのです。うまい具合にほとんどのGnu/LinuxのディストリビューションではフリーソフトのThunderbirdというメールプログラムをインストールできます。ブラウザーを使ってもGmailのようなメールアカウントをアクセスできますが、Thunderbirdを始めとするメールプログラムはブラウザーよりも多機能です。

-

Most GNU/Linux operating systems come with GnuPG installed on them, so you don't have to download it. Before configuring GnuPG though, you'll need a desktop email program installed on your computer. Most GNU/Linux distributions have a free software version of the Thunderbird email program available to install. This guide will work with them, in addition to Thunderbird itself. Email programs are another way to access the same email accounts you can access in a browser (like GMail), but provide extra features.

-

If you are already have one of these, you can skip to Step 1.b.

+

そういうメールプログラムがもうパソコンにインストールされているなら、1.Bに進んでください。

@@ -109,19 +112,19 @@

Step 1.A: Install Wizard

-

Step 1.a Set your email program up with your email account (if it isn't already)

-

Open your email program and follow the wizard that sets it up with your email account.

+

1.A メールプログラムに自分のメールアカウントを設定する(まだ設定済でない場合)

+

メールプログラムを起動し、ウィザードの指示に従ってメールアカウントを設定してください。

-

Troubleshooting

+

トラブル・シューティング

-
What's a wizard?
-
A wizard is a series of windows that pop up to make it easy to get something done on a computer, like installing a program. You click through it, selecting options as you go.
-
My email program can't find my account or isn't downloading my mail
-
Before searching the Web, we recommend you start by asking other people who use your email system, to figure out the correct settings.
- - +
ウィザードとは何ですか?
+
ウィザードとは、パソコンで何かを設定するとかインストールするためのウィンドウが順番に表れるようになっているものす。「次へ」のボタンをクリックして、設定をしていきます。
+
私のメールプログラムではメールアカウントが見つからない、またはメールがダウンロードされません
+
インターネットを検索する前に、同じメールプログラムを使っている人に正しい設定方法をたずねることをお勧めします。
+
@@ -182,7 +185,7 @@

Use the default options until you reach the screen titled "Create Key".

On the screen titled "Create Key," pick a strong password! Your password should be at least 12 characters and include at least one lower case and upper case letter and at least one number or punctuation symbol. Don't forget the password, or all this work will be wasted!

The program will take a little while to finish the next step, the "Key Creation" screen. While you wait, do something else with your computer, like watching a movie or browsing the Web. The more you use the computer at this point, the faster the key creation will go.

-

When the OpenPGP Confirm screen pops up, select Generate Certificate and choose to save it in a safe place on your computer (we recommend making a folder called "Revocation Certificate" in your home folder and keeping it there. You'll learn more about the revocation certificate in Section 5. The setup wizard will ask you to move it onto an external device, but that isn't necessary at this moment.

+

When the OpenPGP Confirm screen pops up, select Generate Certificate and choose to save it in a safe place on your computer (we recommend making a folder called "Revocation Certificate" in your home folder and keeping it there). You'll learn more about the revocation certificate in Section 5. The setup wizard will ask you to move it onto an external device, but that isn't necessary at this moment.

@@ -213,7 +216,7 @@

Troubleshooting

The progress bar never finishes
-
Close the upload popup, make sure you are on the Internet and try again. If that doesn't work, try again, selecting a different keyserver.
+
Close the upload popup, make sure you are connected to the Internet, and try again. If that doesn't work, try again, selecting a different keyserver.
My key doesnt appear in the list
Try checking Show Default Keys.
@@ -266,7 +269,7 @@

Step 3.b Send a test encrypted email

Write a new email in your email program, addressed to adele-en@gnupp.de. Make the subject "Encryption test" or something similar and write something in the body. Don't send it yet.

Click the icon of the key in the bottom right of the composition window (it should turn yellow). This tells Enigmail to encrypt the email with the key you downloaded in the last step.

-

Next to the key, you'll notice an icon of a pencil. Clicking this tells Enigmail to add a special, uniqe signature to your message, generated using your private key. This is a separate feature from encryption, and you don't have to use it for this guide.

+

Next to the key, you'll notice an icon of a pencil. Clicking this tells Enigmail to add a special, unique signature to your message, generated using your private key. This is a separate feature from encryption, and you don't have to use it for this guide.

Click Send. Enigmail will pop up a window that says "Recipients not valid, not trusted or not found."

To encrypt and email to Adele, you need her public key, and so now you'll have Enigmail download it from a keyserver. Click Download Missing Keys and use the default in the pop-up that asks you to choose a keyserver. Once it finds keys, check the first one (Key ID starting with 9), then select ok. Select ok in the next pop-up.

@@ -328,11 +331,11 @@

#4 Learn the Web of Trust

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friend's name, creating keys to go with it and impersonating your friend. That's why the free software programmers that developed email encryption created keysigning and the Web of Trust.

-

When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor. People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of all GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant network. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

+

When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor. People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of all GnuPG users, connected to each other by chains of trust expressed through signatures, forming a giant network. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

People's public keys are usually identified by their key fingerprint, which is a string of digits like DD878C06E8C2BEDDD4A440D3E573346992AB3FF7 (for Adele's key). You can see the fingerprint for your public key, and other public keys saved on your computer, by going to OpenPGP → Key Management in your email program's menu, then right clicking on the key and choosing Key Properties. It's good practice to share your fingerprint wherever you share your email address, so that so that people can double-check that they have the correct public key when they download yours from a keyserver.

-

You may also see public keys referred to by their key ID, which is simply the last 8 digits of the fingerprint, like 92AB3FF7 for Adele. The key ID is visible directly from the Key Management Window. This key ID is like a person's first name (it is a useful shorthand but may not be unique to a given key), whereas the fingerprint actually identifies the key uniquely without the possibility of confusion. If you only have the key ID, you can still look up the key (as well as its fingerprint), like you did in Step 3, but if multiple options appear, you'll need the fingerprint of the person to are trying to communicate to verify which one to use.

+

You may also see public keys referred to by their key ID, which is simply the last 8 digits of the fingerprint, like 92AB3FF7 for Adele. The key ID is visible directly from the Key Management Window. This key ID is like a person's first name (it is a useful shorthand but may not be unique to a given key), whereas the fingerprint actually identifies the key uniquely without the possibility of confusion. If you only have the key ID, you can still look up the key (as well as its fingerprint), like you did in Step 3, but if multiple options appear, you'll need the fingerprint of the person to whom are trying to communicate to verify which one to use.

@@ -391,7 +394,7 @@

When should I encrypt?

-

The more you can encrypt your messages, the better. This is because, if you only encrypt emails occasionally, each encrypted message could raise a red flag for surveillance systems. If all or most of your email is encrypted, people doing surveillance won't know where to start.

+

The more you can encrypt your messages, the better. If you only encrypt emails occasionally, each encrypted message could raise a red flag for surveillance systems. If all or most of your email is encrypted, people doing surveillance won't know where to start.

That's not to say that only encrypting some of your email isn't helpful -- it's a great start and it makes bulk surveillance more difficult.

@@ -415,8 +418,8 @@

Copy your revocation certificate to somewhere safe

-

Remember when you created your keys and saved the revocation certificate that GnuPG made? It's time to copy that certificate onto the safest digital storage that you have -- the ideal thing is a flash drive, disk or hard drive stored in a safe place in your home.

-

If your private key ever gets lost or stolen, you'll need this certificate file.

+

Remember when you created your keys and saved the revocation certificate that GnuPG made? It's time to copy that certificate onto the safest digital storage that you have -- the ideal thing is a flash drive, disk, or hard drive stored in a safe place in your home.

+

If your private key ever gets lost or stolen, you'll need this certificate file to let people know that you are no longer using that keypair.

@@ -486,9 +489,9 @@