ABCDE
1
termposcommenttranslation_pt_PTcomment_pt_PT
2
2-factor authenticationNoun[Safe Sisters] "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF)autenticação de 2 fatores
3
2FANoun[Safe Sisters] Two-factor authentication
"Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: two-step verification, multi-factor authentication.Source EFF.
2FA
4
add-onNoun[Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)extra
5
addonNoun[Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: extensions, plugins) (Source: EFF)
6
adversaryNounYour adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates at a school. Often the adversary is hypothetical.
Source EFF.
7
air gapNounA computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.Source EFF.An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated from all other networks.Source Wikipedia
8
antivirusNoun[Outline, Tor] Software that attempts to protect a device from being taken over by malicious software (or “malware"). Viruses were some of the first and most prevalent forms of malware; they were named viruses to reflect the way they would spread from device to device. These days most antivirus software concentrate on warning you if you look to be downloading a suspicious file from an external source, and examining files on your computer to see if they match the software's idea of what malware looks like.Anti-virus software can only recognize malware if it is substantially similar to samples that the anti-virus developer has already analyzed. This makes it far less effective at combating targeted malware designed to infiltrate a particular community or person, rather than more widespread strains of malware. Some advanced malware can also actively attack or conceal itself from antivirus software.Source EFF.
9
assetNounIn threat modeling, any piece of data or a device that needs to be protected.Source EFF.
10
asymmetric-key encryptionNounTraditional encryption systems use the same secret, or key, to encrypt and decrypt a message. So if I encrypted a file with the password "bluetonicmonster", you would need both the file and the secret "bluetonicmonster" to decode it. Public key encryption uses two keys: one to encrypt, and another to decrypt. This has all kinds of useful consequences. For one, it means that you can hand out the key to encrypt messages to you, and as long as you keep the other key secret, anyone with that key can talk to you securely. The key you hand out widely is known as the "public key": hence the name of the technique. Public key encryption is used to encrypt email and files by Pretty Good Privacy (PGP), OTR for messaging, and SSL/TLS for web browsing.Synonyms: Public key encryption, Public key cryptography. Source: EFF
11
attackNounIn computer security, an attack is a method that can be used to compromise security, or its actual use. An attacker is the person or organization using an attack. An attack method is sometimes called an "exploit."
Source EFF.
12
browser fingerprintNoun[Tor] The various properties of your web browser or computer that a web site can notice when you visit. They may be slightly different from other browsers or computers, which can be a way to recognize you even if you didn't log in, even if your computer doesn't save cookies, and even if you connect to the Internet from a different network in the future. For example, you might be the only person who uses a particular site from a device set to a particular language, with a particular screen size, and using a particular web browser version; then the site could realize that it's you whenever you visit, even if you don't do anything to reveal your identity.Source EFF.
13
burner phoneNounA phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)(Source: EFF)
14
C&CNounA command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF.
15
C2NounA command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: Command and control server, C2.Source EFF.
16
capabilityNounThe capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.Source EFF.
17
certificateNoun[TunnelBear] [KeePassXC] [Psiphon]

Likely short for "security certificate".

A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.(Synonyms: Digital certificate) (Source EFF)
certificado
18
command and control serverNounAlso “command-and-control server”
A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.Synonyms: C&C, C2.Source EFF.
19
command lineNoun[CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations. Source EFF.
20
command-and-control serverNounAlso “command and control server”
A command-and-control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: C&C, C2.
Source EFF.
21
Command-line toolNoun[CGIProxy] The "command line" is a way of giving a computer a series of small, self-contained orders. To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Mac desktop computers still run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar "icons and buttons" user interface. The command line requires you to type in exactly the right set of letters and numbers to get the correct result, and it can be unclear what to do if the responses don't match your expectations.Source EFF.
22
commercial VPNNounA commercial Virtual Private Network is a private service that offers to securely relay your Internet communications via their own network. The advantage of this is that all of the data you send and receive is hidden from local networks, so it is safer from nearby criminals, untrusted local ISPs, or anyone else spying on your local network. A VPN may be hosted in a foreign country, which is useful both for protecting communications from a local government, and bypassing national censorship. The downside is that the traffic is decrypted at the commercial VPN's end. That means you need to trust the commercial VPN (and the country where it is located) not to spy on your traffic.Source EFF.
23
cookieNoun[Tor] [CGIProxy] [Orbot] [Psiphon]

Cookies are a web technology that let websites recognize your browser. Cookies were originally designed to allow sites to offer online shopping carts, save preferences or keep you logged on to a site. They also enable tracking and profiling so sites can recognize you and learn more about where you go, which devices you use, and what you are interested in – even if you don't have an account with that site, or aren't logged in.
(Source : EFF)
cookie
24
corporate intranetNounCompanies and other large institutions will usually have some services (email, web, and access to files and printers for instance) that are accessible from within their own local network, but not from outside on the wider Internet. Most companies take this as being sufficient security to protect their internal documents, but this means that any attack that can connect to the intranet can access or interfere with all the information being kept locally. An example of such an attack is tricking an employee to install malware on their laptop. To allow employees to access the intranet via the wider Internet, companies will often provide their own Virtual Private Network (VPN) which creates a secure connection to the inside of the intranet from anywhere in the world.Source EFF.
25
cryptographic signatureNoun[Tor] The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official published version, and that nobody has tampered with it. They're also often used on encrypted email and for many other purposes. When information isn't protected by a digital signature, an Internet service provider or other communications provider could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Synonyms: digital SignatureSource EFF.
26
cryptographyNounThe art of designing secret codes or ciphers that let you send and receive messages to a recipient without others being able to understand the message.Source EFF.criptografia
27
cryptopartyNounWhen you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: key-signing party.Source EFF.
28
DDoSNoundistributed denial of service

A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)
29
DDoS (distributed denial of service)NounA method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)
30
digital certificateNounA way to confirm automatically that a public key is correct (is really the one that's used by a particular entity), in order to prevent man-in-the-middle attacks. Most often used by web sites to prove to your browser that you have a secure connection to the real site, and not to some other system that's tampering with your connection.Synonyms: Security certificate.Source EFF.
31
digital signatureNoun[Mailvelope]The use of a mathematical technique to confirm the origin of information, and to confirm that it wasn't changed since it was written. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official version, and that nobody has tampered with it. They're also often used to confirm encrypted email has not been altered. When information isn't protected by a digital signature, an attacker could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.Source EFF.
32
domain nameNounThe address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF)
33
encryptionNoun[TunnelBear, Mailvelope, Globaleaks, Orbot Tor] A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. (Source: EFF)encriptação, codificação
34
encryption keyNoun[TunnelBear] [Globaleaks] An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different. (Source: EFF)Chaves de encriptação
35
end-to-end encryptionNoun[Tor, Signal] End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption. (Source: EFF)
encriptação extremidade-a-extrimidade, codificação extremidade-a-extrimidade
36
extensionNoun[Mailvelope, Tor] A piece of software that modifies another software application, changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add-ons are malware, so be careful to install only those that are reputable and from official sources. (Synonyms: Add-on, Plugin)(Source: EFF)extensão
37
File fingerprintNounA sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
Synonyms: file hash value.
Source EFF.
38
file fingerprintNounA sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.Synonyms: file hash value.Source EFF.
39
File hash valueNounA sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.
Synonyms: File fingerprint.
Source EFF.
40
file hash valueNounA sequence or letters or numbers that represent the contents of a file. Changing the file even a tiny bit will completely change its fingerprint. Checking the fingerprint of a file that you've downloaded, such as a software application or extension, helps to make sure that you got the same file that other people have, and that nobody has tampered with it while it was being downloaded.Synonyms: File fingerprint.Source EFF.
41
File systemNounWhere data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.
Source EFF.
42
file systemNounWhere data is stored, usually locally, on your computer or other device. File systems are usually where personal documents and notes are stored for easy access.Source EFF.
43
fingerprintNoun[Orbot] The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits. So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each calculate your key's fingerprint and compare those instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.Source EFF.impressão digital
44
FirewallNounA tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. Or they can be used to prevent users from using the Internet in certain ways. (Source: EFF)
45
Forward SecrecyNounA property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.
Synonyms: Perfect forward secrecy.
Source EFF.
46
forward secrecyNounA property of a secure messaging system which ensures that your past communications can remain secure even if one of the secret keys is stolen later. Forward secrecy works by using the participant’s secret keys to generate a new key, which is only used for the current conversation and destroyed afterwards, rendering old messages impossible to decrypt. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For instant messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.A property of a secure messaging system which ensures that your past communications can remain secure even if one of the private keys is stolen later. For HTTPS websites, forward secrecy is an important protection against adversaries like intelligence agencies which may record large amounts of traffic and use a stolen key to decrypt it. For messaging and chat systems, forward secrecy is necessary to ensure that deleted messages are really deleted, but you will also need to either disable logging or securely delete past messages.Synonyms: Perfect forward secrecy.Source: EFF.
47
FTP (File Transfer Protocol)Noun[CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox.Synonyms: FTP server, File Transfer Protocol. (Source: EFF)
48
FTP serverNoun[CGIProxy] An old method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers and web servers, or file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer Protocol) (Source EFF)
49
Full disk encryptionNounIf you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default. Source EFF.
50
full disk encryptionNounIf you're planning on securing data on your local device, you could choose to just encrypt a few key files, or you could encrypt everything on the computer. “Full disk encryption” is the term for encrypting everything. It's usually safer (and often easier) to use full disk encryption than to manage just a few individually encrypted files. If you try to encrypt just individual files, your computer might make temporary unencrypted copies of those files without you noticing. And some software might keep some unencrypted records about your use of your computer. Apple's OS X, Linux and high-end versions of Windows all have built-in full disk encryption, but it is usually not turned on by default.Source EFF.
51
GistNounIn computing, Gist is a scientific graphics library written in C by David H. Munro of Lawrence Livermore National Laboratory. It supports three graphics output devices: X Window, PostScript, and Computer Graphics Metafiles (CGM). The library is promoted as being small (writing directly to Xlib), efficient, and full-featured. -https://en.wikipedia.org/wiki/Gist_(computing) [Signal]
52
IMAP settingsNounIMAP is the way that many email programs communicate with services that send, receive and store your email. By changing the IMAP settings on your email program, you can choose to load email from different servers or set the level of security and encryption used to transfer the mail across the Internet to you.Source EFF.
53
Indicators of compromiseNounClues that show that your device may have been broken into or tampered with.
Source EFF.
54
indicators of compromiseNounClues that show that your device may have been broken into or tampered with.Source EFF.
55
Internet filteringNounFiltering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF)
56
Internet filtering, content filteringNoun[Orbot] Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Network or services like Tor are sometimes used to access Internet communciations that would otherwise be filtered.(Source: EFF)
57
internet filtering, content filteringNoun[Orbot] Filtering is the politer term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: EFF)
58
IP addressNoun[Orbot, Outline, CGIProxy, Tor] A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a web site or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. (Source EFF)Endereço de IP
59
keyNounIn cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. (Source EFF) [Globaleaks] [Signal]
60
Key fingerprintNounA sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.
Source EFF.
61
key fingerprintNoun[Mailvelope] A sequence of letters or numbers that represent a public key. Some privacy tools let you check the match between someone's key fingerprint as seen by your device and by their device. The purpose of this check is to prevent a man-in-the-middle attack, where someone tricks you into using the wrong key.Source EFF.Impressão digital de chave
62
key pairNoun[Mailvelope] To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a "key pair."Source EFF.Synonym: keypair
63
key pair (keypair)Noun[Mailvelope] To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a "key pair."Source EFF.Synonym: keypair
64
Key verificationNounIn public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.
Source EFF.
65
key verificationNounIn public key cryptography, each person has a set of keys. To send a message securely to a particular person, you encrypt your message using their public key. An attacker may be able to trick you into using their key, which means that they will be able to read your message, instead of the intended recipient. That means that you have to verify that a key is being used by a particular person. Key verification is any way that lets you match a key to a person.Source EFF.Verificação de chave
66
Key-signing partyNounWhen you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.
Analogy: It's like a networking party, where you introduce your friends to other friends.
Synonyms: cryptoparty.
Source EFF.
67
key-signing partyNounWhen you're using public key encryption, it's important to be sure that the key you use to encrypt a message really belongs to the recipient (see key verification). PGP makes this a little easier by having a way to tell others "I believe this key belongs to this person -- and if you trust me, you should believe that too." Telling the world that you trust someone's key is called "signing their key": it means anyone who uses that key can see you vouched for it. To encourage everyone to check and sign each others keys, PGP users organize key-signing parties. They're almost, but not quite, as exciting as they sound.Analogy: It's like a networking party, where you introduce your friends to other friends.Synonyms: cryptoparty.Source EFF.
68
KeyloggerNounA malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.
Source EFF.
69
keyloggerNounA malicious program or device that records everything you type into a device, including passwords and other personal details, allowing others to secretly collect that information. (The "key" in keylogger refers to the keys you have on your keyboard.) Keyloggers are often malware that users have been tricked into downloading and running, or occasionally physical hardware secretly plugged into a keyboard or device.Source EFF.Registador de digitação
70
keypairNoun[Mailvelope]
[Tor]
To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret. The other, the public key, you can let anyone see. The two keys are connected mathematically, and are often collectively known as a “key pair.”
Source EFF.
Synonym: keypair
71
keyringNoun[Mailvelope] "If you use public key cryptography, you'll need to keep track of many keys: your secret, private key, your public key, and the public keys of everyone you communicate with. The collection of these keys is often referred to as your keyring."Source EFF.chaveiro
72
Malicious softwareNounMalware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
Synonyms: Malware.
Source EFF.
73
malicious softwareNounMalware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malware.Source EFF.
Software malicioso, Programa malicioso
74
MalwareNounMalware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.
Synonyms: Malicious software
Source EFF.
75
malwareNoun[Safe Sisters] Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.Synonyms: Malicious softwareSource EFF.
76
Man-in-the-middle attackNounSuppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
Synonyms: MITM
Source EFF.
77
Man-in-the-middle attack (MITM)NounSuppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: MITMSource EFF.
78
man-in-the-middle attack (MITM)NounSuppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: MITMSource EFF.
79
Master passwordNounA password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.
Source EFF.
80
master passwordNounA password used to unlock a store of other passwords or other ways to unlock programs or messages. You should make a master password as strong as you can.Source EFF.Palavra-passe Principal
81
metadataNounMetadata (or "data about data") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF) [Signal]
82
MITMNounSuppose you believe you were speaking to your friend, Bahram, via encrypted instant messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.
Synonyms: Man-in-the-middle attack.
Source EFF.
83
MITM (Man-in-the-middle attack)NounSuppose you believe you were speaking to your friend, Bahram, via encrypted messenger. To check it's really him, you ask him to tell you the city where you first met. "Istanbul" comes the reply. That's correct! Unfortunately, without you or Bahram knowing, someone else online has been intercepting all your communications. When you first connected to Bahram, you actually connected to this person, and she, in turn, connected to Bahram. When you think you are asking Bahram a question, she receives your message, relays the question to Bahram, receives his answer back , and then sends it to you. Even though you think you are communicating securely with Bahram, you are, in fact, only communicating securely with the spy, who is also communicating securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can spy on communications or even insert false or misleading messages into your communications. Security-focused internet communications software needs to defend against the man-in-the-middle attack to be safe against attackers who have control of any part of the Internet between two communicators.Synonyms: Man-in-the-middle attack.Source EFF.
84
Off-the-RecordNoun[Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for messaging conversations. (Synonyms : OTR) (Source EFF)
85
One-time passwordNounPasswords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
Source EFF.
86
one-time passwordNounPasswords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.Source EFF.Palavra-passe única
87
open sourceNoun[Orbot, Outline] Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.Synonyms: FLOSS, free, libre and open-source software, free softwareSource EFF.Also written open-source
88
open source softwareNoun[Outline] Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.Synonyms: FLOSS, free, libre and open-source software, free softwareSource EFF.
89
open-sourceAdjective[Orbot] [Psiphon]

Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.Synonyms: FLOSS, free, libre and open-source software, free softwareSource EFF.Also written open source
90
Open-source softwareNounOpen source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.
Synonyms: FLOSS, free, libre and open-source software, free software
Source EFF.
91
open-source softwareNoun[Outline] [Psiphon]

Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor.Synonyms: FLOSS, free, libre and open-source software, free softwareSource EFF.Also written open source software.
Software de código aberto
92
Operating System (OS)Noun[Signal, Tor] A program that runs all the other programs on a computer. Windows, Android and Apple's OS X and iOS are all examples of operating systems. (Source: EFF)(Synonym: OS)
93
Out-of-band verificationNounOut-of-band means any way of communicating outside of the current method. Verifying the identity of the person you're talking to over an insecure communication system often requires communicating out-of-band via another method that is less vulnerable to the same kind of attack. So, for instance, you might check that you are using someone's correct public key by talking to them in person, before using it to encrypt your email.Synonyms: out-of-bandSource EFF.
94
paravirtualizationNounParavirtualization An efficient and lightweight virtualization technique originally introduced by the Xen Project and later adopted by other virtualization platforms.
95
Passive adversaryNounA passive adversary is one that can listen to your communications, but cannot directly tamper with them.
Source EFF.
96
passive adversaryNounA passive adversary is one that can listen to your communications, but cannot directly tamper with them.Source EFF.
97
passphraseNoun[KeePassXC] [Signal] [Safe Sisters] [Tella] A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/ (Source: EFF)frase-palavra-passe
98
Password managerNounA tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
Synonyms: Secure password database; password safe.
Source EFF.
99
Password safeNounA tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.
Synonyms: Secure password database, Password manager.
Source EFF.
100
password safeNounA tool that can encrypt and store your passwords using a single master password making it practical to use many different passwords on different sites and services without having to memorize them.Synonyms: Secure password database, Password manager.Source EFF.Palavra-passe segura