ABCDE
1
termposcommenttranslation_escomment_es
2
ConjunctionPunctuation, not a conjunction, however “punctionation” is not an option in Transifex...
3
Conjunctionvertical ellipsis
4
2-factor authenticationNoun[Safe Sisters] "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF)autenticación de 2 factores
5
24/7NounTwenty-four hours, seven days a week. This essentially means "all the time" (non stop). Ex: The store is open 24/7 = The store is always open. The application runs 24/7 = The application is always running.24/7
6
2FANoun[Safe Sisters] Two-factor authentication
"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: two-step verification, multi-factor authentication.Source EFF.
2FA
7
3D bar chartNoun[Martus]Gráfico de barras 3D
8
A reasonably secure operating systemNoun[Qubes OS] This is the Qubes OS tagline.Un sistema operativo razonablemente seguro
9
A security-oriented operating systemNoun[Qubes OS]Un sistema operativo enfocado en la seguridad
10
acceptVerb[Signal]aceptar
11
accessNounacceso
12
access keyNoun[Outline]tecla de acceso
13
access modeNounModo de acceso
14
access tokenNoun[Martus] Short identification number used to add Contacts to your Martus account.Credencial de acceso
15
accessibilityNounaccesibilidad
16
accountabilityNounresponsabilidad(Homónimo) contabilidad. As in the activity performed by a certified public accountant.
17
AccountingMaxAdverbAccountingMax
18
acknowledgeVerbAn acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment"reconocer
19
acknowledgedAdjectiveAn acknowledgment in Peerio is similar to a message, but sends a "thumbs up" icon with no additional text. The thumbs-up icon is referred to as an "acknowledgment"reconocido
20
acknowledgmentNounAmerican English — A button in Peerio that functions similar to a message, but sends a "thumbs up" icon with a timestamp. The thumbs-up icon is referred to as an "acknowledgment"agradecimiento
21
acquireVerbadquirir
22
activateVerb[Orbot]activar
23
actorNoun[SAFETAG] In the context of SAFETAG: The staff, volunteers, partners, beneficiaries, donors, and adversaries associated with the organization.actor[SAFETAG] Actores son las personas conectadas a una organización, incluyendo el personal, miembros de la comisión directiva, contratistas y socios. Los actores pueden también incluir voluntarios, miembros de una comunidad más amplia ejerciendo las mismas prácticas, e incluso miembros de la familia. También incluyen potenciales adversarios de la organización, tales como grupos competidores.
24
ad providerNoun[Psiphon]proveedor de publicidad[Psiphon}
25
ad-blockerNoun[Psiphon]

"Ad blocking or ad filtering is a type of software that can remove or alter advertising content from a webpage, website, or a mobile app." - Wikipedia (https://en.wikipedia.org/wiki/Ad_blocking)
bloqueador de publicidad[Psiphon]
"El bloqueo de publicidad (también llamado: filtrado de publicidad y/o bloqueo de anuncios) es la eliminación o alteración de contenido publicitario de una página web" - Wikipedia (https://es.wikipedia.org/wiki/Bloqueo_de_publicidad)
26
add-onNoun[Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)complementoSometimes written as 'extensión'.
27
add-onsNoun[Tor]complementosSometimes written as 'extensión'.
28
addonNoun[Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)complementoSometimes written as 'extensión'.
29
addonsNoun[Tor]complementosSometimes written as 'extensiones'.
30
address barNounbarra de dirección
31
address bookNoundirectorioej: directorio telefónico.
Sinónimos: listado, guía
32
ADIDSNounADIDS is an approach to education and training. It is an acronym that stands for: Activity, Discussion, Input, Deepening and SynthesisADIPS
33
administrativeAdjectiveadministrativoEj: permiso administrativo, nivel administrativo (referente al nivel de privilegio otorgado para acceder a un recurso/objeto)
34
advanced searchNoun[Martus]búsqueda avanzada
35
advanced userNounusuario avanzado
36
agency buildingNoun[SAFETAG] "...building the organization's agency" To increase an organization's ability to make decisions and do things on their own.construcción de operatividad[SAFETAG] "...construyendo la operatividad de la organización": incrementar la habilidad de la organización para tomar decisiones y hacer cosas por sí misma.
37
agentNounagente
38
air-gappedAdjectiveAlso "air gapped".aisladaUn computador que no tiene conexión cableada o inalámbrica a una red
39
AliceNoun[Briar]Alicia
40
alternateNounalterna, -oComo verbo: José alterna entre un proyecto y otro.
41
alternateAdjectivealternadoComo adjetivo: El relevo de guardias es alternado.
42
alternativeAdjectivealternativo
43
Always-on VPNNoun[Psiphon]

Setting on Android phones that ensures your device always uses a VPN when connected to the internet. Refer to Android Settings > VPN to see how the phrase it translated.
VPN siempre activada[Psiphon}
Configuración en teléfonos de Android que asegura que tu teléfono siempre utilice una red VPN cuando esté conectado al internet.
44
ambiguousAdjectiveambiguo
45
AndroidNoun[Signal] [Orbot] [Psiphon]

Operating system
AndroidSistema operativo
46
anonymizationNoun"It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous." (Source: https://en.wikipedia.org/wiki/Data_anonymization)anonimización
47
anonymizeVerb[Orbot, Signal, Outline] To encrypt or remove personally identifiable information from data sets, so that the people whom the data describe remain anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization)anonimizar"l anonimato es el carácter o la condición de anónimo,1​ es decir, que la identidad de una persona o entidad es desconocida." (Fuente: https://es.wikipedia.org/wiki/Seudonimato_y_anonimato)
48
antivirusNoun[Outline, Tor] Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.Source EFF.antivirus
49
APINounApplication Programming Interface: "In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software." - WikipediaAPIInterfaz de programación de aplicaciones
"La interfaz de programación de aplicaciones, abreviada como API del inglés: Application Programming Interface, es un conjunto de subrutinas, funciones y procedimientos (o métodos, en la programación orientada a objetos) que ofrece cierta biblioteca para ser utilizado por otro software como una capa de abstracción." - Wikipedia
50
APKNoun"Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10." https://en.wikipedia.org/wiki/Android_application_packageAPK"Un archivo con extensión .apk (Android Application Package, significado en español: Aplicación empaquetada de Android) es un paquete para el sistema operativo Android." - Wikipedia
51
appNoun[Orbot] [Tor] [Safe Sisters]

Abbreviation of "application." (Synonyms: application)
aplicación, app
52
Apple App StoreNoun[Signal] [Psiphon]App Store[Signal] [Psiphon]
Sinónimo: "Tienda de aplicaciones"
53
applyVerbsolicitarSinónimo: aplicar
54
approachNounforma de encararSinónimo: abordaje, planteamiento
55
approveVerbaprobar
56
AppVMNoun[Qubes OS]

"Application Virtual Machine"A VM which is intended for running software applications.
AppVMVer TemplateVM
57
arriveVerbllegar
58
assetNounIn threat modeling, any piece of data or a device that needs to be protected.Source EFF.recurso[SAFETAG] Los recursos son más fácilmente conceptualizados como sistemas informáticos (ordenadores portátiles y servidores), pero también incluyendo tanto los datos almacenados en ellos como servicios tales como almacenamiento remoto de archivos, sitios web hospedados, correo web, y más. Discos fuera de la red, unidades USB, e incluso impresiones en papel de información relevante o sensitiva también pueden ser incluidos.
59
attachmentNoun[Signal] File sent together with an email or other electronic message.adjunto
60
auth tokenNoun[Orbot]token de autenticación, token de seguridad"Un token de seguridad (también token de autenticación o token criptográfico) es un aparato electrónico que se le da a un usuario autorizado de un servicio computarizado para facilitar el proceso de autenticación." (Fuente: https://es.wikipedia.org/wiki/Token_de_seguridad)
61
authenticateVerbacreditar
62
authorNounautor
63
back upVerbcrear copia de seguridad
64
backgroundNounScreen surface where text and graphic elements are displayedsegundo plano(Sinónimo) trasfondo
65
backupNoun[Signal] [Orbot] Copy of data, updated regularly or not, in order to allow restoration in case of data loss.It can be stored locally, on the cloud or on a removable medium such as an optical disk or USB drive. This last option allows backups to be stored away safely.copia de seguridad, respaldo
66
backup key fileNoun[Martus] Also: key backupCopia de seguridad de par de claves
67
bandwidthNoun[Tor][Orbot]ancho de banda
68
bar chartNoungráfico de barras
69
barrierNoun[SAFETAG] Barriers are specific challenges an organization faces that might limit or block its capacity.barrera[SAFETAG] Las barreras son desafíos específicos que una organización enfrenta que pueden limitar o bloquear su capacidad.
70
BCCNoun"Blind carbon copy"CCOBCC
71
big dataNoundatos masivos
72
binaryNoun[KeepassXC, CGIProxy] Binary file.8-bit encoded data file using only 0 and 1, different from ASCII which is 7-bit encoded.archivo binario"Un archivo binario es un archivo informático que contiene información de cualquier tipo codificada en binario para el propósito de almacenamiento y procesamiento en ordenadores. Por ejemplo los archivos informáticos que almacenan texto formateado o fotografías, así como los archivos ejecutables que contienen programas" (Fuente: https://es.wikipedia.org/wiki/Archivo_binario)
73
bookmarkNoun[Psiphon]

A "bookmark" is a saved webpage.
marcador
74
booleanAdjective[KeepassXC]tipo de dato lógico / boolean"El tipo de dato lógico o booleano es en computación aquel que puede representar valores de lógica binaria, esto es 2 valores, valores que normalmente representan falso o verdadero." - Wikipedia
75
bootVerb[Orbot]arrancar / ejecutar / iniciar
76
bootNoun[Orbot]iniciaciónTambién: ejecución inicial
77
bootableAdjectivearrancable / ejecutable
78
bootloaderNounSynonyms: boot loadercargador de arranqueg
79
boxNounordenadorUtilizado en el contexto de comunicaciones electrónicas
80
break inNounirrupción
81
bridge lineNoun[Tor] a line with the bridge configurationlínea de puenteSe refiere a una línea particular en un archivo de configuración.
82
bridge relayNoun[Tor]repetidor puente
83
bridge typeNoun[Tor]tipo de puente de red
84
bugNoun“A software bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.”
https://en.wikipedia.org/wiki/Software_bug
error
85
bug reportNoun[Signal]informe de error
86
built-inincorporado
87
bypassVerbpasar, evitar, eludir
88
cancelVerb[Signal]cancelar
89
capacityNoun[SAFETAG] Indicators of capacity include staff skills and a wide variety of resources that an organization can draw from to affect change.capacidad[SAFETAG] Son las habilidades del personal y la amplia variedad de recursos con los que una organización puede contar para afectar la forma en que se produce el cambio.
90
censoredAdjective[Psiphon]censurado, -a
91
censorshipNoun[Signal] [Psiphon]censura
92
certificateNoun[TunnelBear] [KeePassXC] [Psiphon]

Likely short for "security certificate".

A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.(Synonyms: Digital certificate) (Source EFF)
certificado
93
certificateVerb[TunnelBear] [KeePassXC]
To give a certificate
certificar
94
Certificate Signing RequestNounSolicitud de autorización de certificados
95
checksumNoun[Tor] Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical. (Source: Tor Glossary)suma de comprobación
96
circuitNoun[Tor, Orbot] A path through the Tor network built by clients consisting of randomly selected nodes. The circuit begins with either a bridge or a guard. Most circuits consist of three nodes - a guard or bridge, a middle relay, and an exit. Most onion services use six hops in a circuit (with the exception of single onion services), and never an exit node. You can view your current Tor circuit by clicking on the onion button in Tor Browser. (Source: Tor Glossary)circuito
97
circumventVerbevadir
98
clickNounclichttps://dle.rae.es/clic?m=form
99
clickVerb[Signal]cliquear
100
clientNoun[Signal] [Tor] [Orbot] [Psiphon]
As in "desktop client" or "Android client." "In Tor, a client is a node in the Tor network, typically running on behalf of one user, that routes application connections over a series of relays." (Source: Tor Glossary)
cliente