ABCDEF
1
INSTRUCTIONS:
* Add the translation of the English term in the "translation_sw" column.
* Add any notes or comments about the Swahili translation of the term in the "comments_sw".
* Please DO NOT change the content in the "term", "comment" or "pos" columns.
2
termposcommenttranslation_swcomment_sw
3
surveillanceNoun[Orbot] [Pollicy]uchunguzi
4
agritechNoun[Pollicy]kilimo-teknolojia
5
autonomousNoun[Pollicy]inayojiendesha
6
biometric hardwarenoun[Pollicy]programu za biometri
7
cyberbullyingNoun[Pollicy]unyanyasaji wa mtandaoni,
8
cyberstalkingNoun[Pollicy]
9
data journalismNoun[Pollicy]uandishi wa habari wa data
10
data scientistNoun[Pollicy]wanasayansi wa data
11
deepfakeNoun[Pollicy]zilizogushiwa
12
digital activismNoun[Pollicy]uanaharakati wa kidigitali
13
digital gender divideVerb[Pollicy]Mgawanyiko wa Jinsia ya Digitali
14
digital savvyNoun[Pollicy]wajuzi wa dijitali sana,
15
digital technologyNoun[Pollicy]teknolojia ya digitali.
16
digital violenceVerb[Pollicy]Vurugu za digitali
17
disinformationVerb[Pollicy]habari isiyo sahihi
18
doxingNoun[Pollicy]doksia
19
edtechNoun[Pollicy]elimu-teknolojia
20
facial recognitionNoun[Pollicy]utambuzi wa uso
21
false positivesVerb[Pollicy]chanya za uwongo
22
feministNoun[Pollicy]wanaharakati wa utetezi wa wanawake
23
fintechNoun[Pollicy]kifedha-teknolojia
24
fitbitNoun[Pollicy]vifaa janja vya mazoezi
25
free speechNoun[Pollicy]Uhuru wa kuongea
26
gender pay gapVerb[Pollicy]pengo la malipo ya kijinsia
27
gender-based violenceNoun[Pollicy]udhalilishaji wa kijinsia huku vitendo
28
glass ceilingNoun[Pollicy]dari ya glasi
29
healthtechNoun[Pollicy]afya-teknolojia,
30
homosocialNoun[Pollicy]kijamaa
31
human Rights LabNoun[Pollicy]
32
impersonationNoun[Pollicy]uigaji
33
Internet spaceNoun[Pollicy]
34
mal-informationVerb[Pollicy]habari mbaya
35
mass surveillanceVerb[Pollicy]ufuatiliaji wa watu
36
misinformationNoun[Pollicy]habari potofu
37
mobile moneyNoun[Pollicy]Kupokea pesa kwa simu ya rununu
38
moderationverb[Pollicy]ubanaji wa taarifa
39
network disruptionNoun[Pollicy]usumbufu wa mitandao
40
online marketerNoun[Pollicy]Masoko mtandao
41
portmanteauVerb[Pollicy]
42
retailtechVerb[Pollicy]
43
safe sistersNoun[Pollicy]Safe Sisters
44
smart fridgesNoun[Pollicy]Jokofu la kisasa
45
social justiceNoun[Pollicy]haki za kijamii
46
syntheticNoun[Pollicy]
47
technology determinismAdjective[Pollicy]Uamuzi wa teknolojia
48
Web SocietyNoun[Pollicy]Jumuiya ya Wavuti
49
women's rightsNoun[Pollicy] Haki za wanawake
50
women’s movementAdjective[Pollicy]vuguvugu la wanawakevuguvugu la wanawake
51
digital rightsNoun[Pollicy] Digital rights are (human) rights exercised in digital spaces or environments. Haki za dijitali
52
doxingNoun[Pollicy] Obtaining personal information about a person and publishing it online.kuvujisha
53
censorshipNoun[Signal] [Psiphon] [Pollicy]kuvujisha
54
SSD (Solid-State Drive)Noun"A solid-state drive (SSD), or solid-state disk is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently." -https://en.wikipedia.org/wiki/Solid-state_drive

"Historically, computers stored data on rotating magnetic discs. Mobile devices and increasing numbers of personal computers now store permanent data on non-moving drives. These SSD drives are currently more expensive, but much faster than magnetic storage. Unfortunately, it can be more difficult to reliably and permanently remove data from SSD drives."
Source EFF
SSD (Dreva ilio imara)
55
APKNoun"Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10." https://en.wikipedia.org/wiki/Android_application_packageAPK
56
BCCNoun"Blind carbon copy"BCC
57
partitionNoun"Disk partitioning or disk slicing[1] is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately." -https://en.wikipedia.org/wiki/Disk_partitioningkuhesabu
58
GPGNoun"Gnu Privacy Guard" GPG is a free software that implements OpenPGP specificationGPG
59
GistNoun"In computing, Gist is a scientific graphics library written in C by David H. Munro of Lawrence Livermore National Laboratory. It supports three graphics output devices: X Window, PostScript, and Computer Graphics Metafiles (CGM). The library is promoted as being small (writing directly to Xlib), efficient, and full-featured. " -https://en.wikipedia.org/wiki/Gist_(computing) [Signal]kiini
60
SVM (Support Vector Machine)Noun"In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis." - https://en.wikipedia.org/wiki/Support_vector_machineSVM ( Support Vector Machine)
61
anonymizationNoun"It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous." (Source: https://en.wikipedia.org/wiki/Data_anonymization)kutojulikana
62
LGBTQ+Noun"LGBTQ+" stands for "Lesbian, Gay, Bisexual, Transgender, Queer or Questioning and more"https://ok2bme.ca/resources/kids-teens/what-does-lgbtq-mean/LGBTQ
63
NetVMNoun"Network Virtual Machine"A type of VM which connects directly to a network and provides access to that network to other VMs which connect to the NetVM.NetVM
64
open dataNoun"Open data is the idea that some data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control." -Wikipediadata huru
65
optVerb"opt in" / "opt out"chagua
66
Out-of-band verificationNoun"Out-of-band" means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.Synonyms: out-of-bandSource EFF.njee ya wingo sahii
67
paravirtualizationNoun"Paravirtualization" An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.paravirtualization
68
privoxyNoun"Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser. Privoxy is a "privacy enhancing proxy", filtering web pages and removing advertisements. Privoxy can be customized by users, for both stand-alone systems and multi-user networks.[1] Privoxy can be chained to other proxies and is frequently used in combination with Squid and can be used to bypass Internet censorship." Wikipedia: https://en.wikipedia.org/wiki/Privoxyfaragha
69
ServiceVMNoun"Service Virtual Machine"A VM the primary purpose of which is to provide a service or services to other VMs.HudumaVM
70
two-factor authentication (2FA)Noun"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
Synonyms: two-step verification, multi-factor authentication.
Source EFF.
71
3-factor authenticationNoun"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF)
72
split GPGNoun"Split GPG" is the name of a feature. For reference: https://www.qubes-os.org/doc/split-gpg/mgawanyiko GPG
73
US $Noun"USD" or "United States Dollar"US $
74
WhisperBackNoun"WhisperBack" is an application written specifically to report bugs anonymously from inside Tails.UDUKUZI
75
jarNoun“A JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.” (https://en.wikipedia.org/wiki/JAR_(file_format))jar
76
bugNoun“A software bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.”
https://en.wikipedia.org/wiki/Software_bug
77
adhocracyNoun“Adhocracy is a flexible, adaptable and informal form of organization that is defined by a lack of formal structure that employs specialized multidisciplinary teams grouped by functions.”
https://en.wikipedia.org/wiki/Adhocracy
78
ccNoun“carbon copy”cc
79
clock skewNoun“Clock skew (sometimes called timing skew) is a phenomenon in synchronous digital circuit systems (such as computer systems) in which the same sourced clock signal arrives at different components at different times. The instantaneous difference between the readings of any two clocks is called their skew.”
https://en.wikipedia.org/wiki/Clock_skew
80
Cobian BackupNoun“Cobian Backup was a free, donation-supported backup software for Microsoft Windows. It is written in Delphi by Luis Cobian of Umeå University.”
https://en.wikipedia.org/wiki/Cobian_Backup
81
credential stuffingNoun“Credential stuffing is a type of cyberattack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords (often from a data breach) are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application.”
https://en.wikipedia.org/wiki/Credential_stuffing
82
CSRFNoun“Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf[1]) or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.”
https://en.wikipedia.org/wiki/Cross-site_request_forgery
83
Frequently Asked QuestionsNoun“FAQ”maswali yanayoulizwa mara kwa mara
84
canonicalizationNoun“In computer science, canonicalization (sometimes standardization or normalization) is a process for converting data that has more than one possible representation into a "standard", "normal", or canonical form.”
https://en.wikipedia.org/wiki/Canonicalization
85
collision attackNoun“In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.”
https://en.wikipedia.org/wiki/Collision_attack
86
MMSNoun“Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service [Signal]MMS
87
NextNoun“Next” button
88
SMSNoun“SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.[1] It uses standardized communication protocols to enable mobile devices to exchange short text messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal]SMS
89
YYYYNoun“Year” Indicates that user must input a 4-digit year (ex: 1990)YYYY
90
YYYYNoun“Year” Indicates that user must input a 4-digit year (ex: 1990)YYYY
91
addressVerb(1) To address a situation
Synonyms: to fix, to take care of

(2) Give to data or a data set an address in memory

(3) If a letter, envelope, or parcel is addressed to you, your name and address have been written on it.
92
trainingNoun(awareness raising session - concientización, sensibilización)mafunzo
93
trainingNoun(awareness raising session - concientización, sensibilización)mafunzo
94
retrieveVerb(from server)rudisha
95
obfuscated connectionNoun[Bitmask Android]kiunganisho kilichopatikana
96
obtuscated connectionNoun[Bitmask Android]kiunganisho kilichopatikana
97
AliceNoun[Briar]Alice
98
BobNoun[Briar]Bob
99
BriarNoun[Briar]
100
CarolNoun[Briar]Carol