commit 44c7ae9e0660cb7dfe1082a6515129c220d5c9a7
Author: emma peel <[email protected]>
Date:   Mon Nov 19 11:21:47 2018 +0000

    add Arabic glossary from transifex
---
 glossary_ar.csv | 2207 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 2207 insertions(+)

diff --git a/glossary_ar.csv b/glossary_ar.csv
new file mode 100644
index 0000000..69d3750
--- /dev/null
+++ b/glossary_ar.csv
@@ -0,0 +1,2207 @@
+term,pos,comment,translation_ar,comment_ar
+ donation process,,,,
+ testing,,,,
+ third-party,,,,
+!,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",,
+"""",Conjunction,"Punctuation, not a conjunction, however “punctionation” 
is not an option in Transifex","""",""""
+$,,,,
+$,Conjunction,,,
+%s,Conjunction,Do not translate or change. This is a placeholder (ex: 2%s or 
1%s),,
+&nbsp;,Conjunction,"&_nbsp_; [without underscores, Non-Breaking Space]",,
+...,,,,
+...,Conjunction,,,
+24/7,Noun,"Twenty-four hours, seven days a week. This essentially means ""all 
the time"" (non stop). Ex: The store is open 24/7 = The store is always open. 
The application runs 24/7 = The application is always running.",٢٤\٧,
+2FA,Noun,"Two-factor authentication
+Two-factor authentication
+""Something you know, and something you have."" Login systems that require 
only a username and password risk being broken when someone else can obtain (or 
guess) those pieces of information. Services that offer two-factor 
authentication also require you to provide a separate confirmation that you are 
who you say you are. The second factor could be a one-off secret code, a number 
generated by a program running on a mobile device, or a device that you carry 
and that you can use to confirm who you are. Companies like banks, and major 
internet services like Google, Paypal and Twitter now offer two-factor 
authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",,
+3D bar chart,Noun,[Martus],مخطط بأعمدة ثلاثية الأبعاد,
+3rd party,Adjective,[Signal] As in “Use a 3rd party application.”,,
+:,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",,
+;,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",,
+?,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",,
+A reasonably secure operating system,Noun,[Qubes OS] This is the Qubes OS 
tagline.,نظام تشغيل آمن بشكل معقول,
+A security-oriented operating system,Noun,[Qubes OS],نظام تشغيل م
عني بالأمن,
+ADIDS,Noun,what is that?,,
+API,Noun,"Application Programming Interface: ""In computer programming, an 
application programming interface (API) is a set of subroutine definitions, 
protocols, and tools for building application software."" - 
Wikipedia",,"واجهة برمجة التطبيقات: "" وصفٌ 
العناصر البرمجيّة حسب وظائفها، و مدخلاتها 
و مخرجاتها. الهدف الرئيسيّ منها توفير قائمة 
من الوظائف المستقلّة تماماً عن الآلية التي 
نفّذت بها، لتتيح للآخرين التواصل معها من 
خلال أيّ آلية أخرى."" - ويكيبيديا"
+APK,Noun,"""Android application package (APK) is the package file format used 
to distribute and install application software and middleware onto Google's 
Android operating system and sometimes on the BlackBerry OS 10."" 
https://en.wikipedia.org/wiki/Android_application_package",APK,"""حزمة 
برنامج آندرويد (APK) هي صيغة الملف الذي يُستعم
ل في نشر وتثبيت البرامج الخاصة بنظام 
أندرويد."" - ويكيبيديا"
+About,Noun,,,
+Alice,,[Briar],,
+Alice,Noun,[Briar],,
+American Apparel,,,,
+American Apparel,Noun,,,
+Android,Noun,[Signal] [Orbot] Operating system,,
+Anti Evil Maid,Noun,[Qubes OS] Do not translate. Anti Evil Maid is an 
implementation of a TPM-based static trusted boot with a primary goal to 
prevent Evil Maid attacks. (Source: 
https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html),م
كافحة الخادمة الشريرة,هي تقنية لمكافحة هجوم
 الخادمة الشريرة على الأجهزة المشفرة 
بواسطة TrueCrypt.
+App Store,Noun,Apple App Store [Signal],,
+AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended 
for running software applications.",وحدة التطبيقات,
+Apt.,,,,
+Apt.,Noun,,,
+Ativistas,,,,
+Ativistas,Noun,,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],,
+Autonomous System number,Noun,,,
+BCC,Noun,"""Blind carbon copy""",,
+Back,Adverb,,,
+Back to,,,,
+Back to,Adverb,,,
+Backup Key File,Noun,[Martus] Also: key backup,ملف المفتاح 
الاحتياطي,
+Benetech,Noun,Company name which should not be translated or transcribed.,,
+BitTorrent,,,,
+BitTorrent,Noun,,,
+Bitcoin,,,,
+Bitcoin,Noun,,,
+Blow the Whistle,Noun,[Globaleaks],,
+Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,انفخ صفارة 
الإنذار,
+Bob,,[Briar],,
+Bob,Noun,[Briar],,
+Bug,,,,
+C&C,Noun,"A command and control server (C&C or C2) is a computer that gives 
orders to malware-infected devices and receives information from those devices. 
Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+C2,Noun,"A command and control server (C&C or C2) is a computer that gives 
orders to malware-infected devices and receives information from those devices. 
Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+CFC program,,,,
+CFC program,Noun,,,
+CIDR,Noun,Classless inter-domain routing,,
+CPU,Noun,,وحدة المعالجة المركزية,
+CSR,Noun,Certificate Signing Request,,
+CSRF,Noun,,,
+CVC,,,,
+CVC,Noun,,,
+Cancel,Verb,,,
+Card Number,,,,
+Carol,,[Briar],,
+Carol,Noun,[Briar],,
+Certificate Signing Request,Noun,,,
+ChatSecure,Noun,Application Name,,
+Chrome App,Noun,[Signal],,
+Chrome OS,Noun,,,
+Chrome Web Store,Noun,,سوق كْرُومْ الالكتروني,
+Circuit Display,Noun,[Tor],,
+Clear,Noun,,,
+Clearnet,Noun,,الانترنت المكشوف,
+Client User Interface,Noun,,واجهة المستخدم للعميل,
+ClockVM,Noun,,,
+Combined Federal Campaign,,,,
+Combined Federal Campaign,Noun,,,
+Command-line tool,Noun,"The ""command line"" is an ancient way of giving a 
computer a series of small, self-contained orders (think of those science 
fiction movies where teenage geniuses type long strings of green text onto 
black screens). To use a command line tool, the user types a command into a 
window called a terminal emulator, hits the return or enter key, and then 
receives a textual response in the same window. Windows, Linux and Apple 
desktop computers still let you run software using this interface, and even 
some mobile phones can do the same with the right app. The command line can be 
used to run software pre-packaged with your operating system. Some downloadable 
programs, especially technical utilities, use the command line instead of a 
more familiar ""icons and buttons"" user interface. The command line needn't be 
scary, but it does require you to type in exactly the right set of letters and 
numbers to get the correct result, and it's often unclear what to do if the resp
 onses don't match your expectations.
+Source EFF.",أداة سطر أوامر,"إن ""سطر الأوامر"" 
طريقة قديمة جداً لإعطاء الكمبيوتر سلسلة من 
الأوامر الصغيرة المحتواة (فكر بأفلام 
الخيال العلمي والتي تعرض مراهقين عبقريين 
يدخلون سلاسل من النص بلون أخضر على خلفية 
سوداء). لاستخدام سطر الأوامر، يكتب المستخدم 
أمراً في نافذة تدعى terminal emulator ويضغط زر 
الإدخال ومن ثم يحصل على رد نصي ضمن النافذة 
نفسها. لا تزال الكمبيوترات العاملة بنظم 
تشغيل لينوكس وماك وويندوز تسمح لك بتشغيل 
البرامج باستخدام هذه الواجهة، وحتى بعض 
الهواتف الذكية يمكنها القيام بذلك باستخدام 
التطبيق المناسب. يمكن استخدام سطر الأوامر 
لتشغيل برمجيØ
 §Øª موجودة مسبقاً ضمن نظام التشغيل. وتستخدم 
بعض البرامج التي يمكن تنزيلها - خصوصاً برام
ج الأدوات التقنية - سطر الأوامر عوضاً عن 
واجهة تعتمد ""الأيقونات والأزرار"" المألوفة 
بشكل أكبر للمستخدمين. لا داعي للخوف من سطر 
الأوامر، ولكنه يتطلب منك إدخال سلسة الأحرف 
والأرقام بدقة مطلقة للحصول على النتيجة 
الصحيحة، وغالباً ما لا يكون واضحاً ما يتوجب 
فعله عندما تكون الردود لا تطابق توقعاتك."
+Comments,,,,
+Commit,Noun,,,
+Commit,Verb,,,
+Company,,,,
+Company,Noun,,,
+Configuring,,,,
+Contributions,,,,
+Contributors,Noun,,,
+Core,,,,
+Core,Noun,,,
+Courier,Noun,"App name. Do not translate the app name. If necessary, 
transcribe the name into translation language and place in parentheses after 
the original name. Ex: Courier (كوريور)",,
+"Credit Card, credit card",,,,
+"Credit Card, credit card",Noun,,,
+Cross-site scripting,Noun,,,
+Crowdfunding,,,,
+Crowdfunding,Noun,,,
+Crypto,Adjective,,,
+Crypto,Noun,This is an abbreviation of “cryptography.”,,
+Customization Template Files (*.mct),Noun,[Martus],ملفات تخصيصات 
القوالب (*.mct),
+DD,Noun,,,
+DDoS,Noun,"A method for taking a website or other Internet service offline, by 
co-ordinating many different computers to request or send data to it 
simultaneously. Usually the computers used to conduct such an attack are 
remotely controlled by criminals, who have taken over the machines by breaking 
into them, or infecting them with malware.
+Synonyms: distributed denial of service
+Source EFF",,
+DDoS (distributed denial of service),Noun,"A method for taking a website or 
other Internet service offline, by co-ordinating many different computers to 
request or send data to it simultaneously. Usually the computers used to 
conduct such an attack are remotely controlled by criminals, who have taken 
over the machines by breaking into them, or infecting them with malware. 
(Synonyms: DDoS) (Source EFF)",هجوم الحرمان من الخدمة,
+DHT,Noun,,,
+DNS,Noun,Domain Name Server,,
+DNS record,Noun,,,
+DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM 
Templates.",,
+DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,,
+Darknet,Noun,,الإنترنت المظلم,
+Data Retention Strategy,Noun,,,
+Data Source Grid,Noun,,جدول مصدر البيانات,
+Data-Driven Dropdown (Field),Noun,[Matus],,
+Date,Noun,,,
+Debian-based Linux,Noun,[Signal],,
+Deflect,Noun,Don't translate this,,
+Desktop Client,Noun,,سطح مكتب العميل,
+Device Management,Noun,,إدارة الأجهزة,
+Devtools,Noun,,,
+Disconnect,Verb,Disconnect search service,,
+Disconnect ,,Disconnect search service,,
+DispVM,Noun,"[QubesOS] ""Disposable Virtual Machine""A temporary AppVM based 
on a DVM Template which can quickly be created, used, and destroyed.",,
+Distributed,Verb,,وزع,
+Distribution,Noun,,التوزيعة,
+Divice Management,Noun,,,
+Dom0,Noun,"[QubesOS] ""Domain Zero"" Also known as the **host** domain, dom0 
is the initial VM started by the Xen hypervisor on boot.",,
+DomU,Noun,"[QubesOS] ""Unprivileged Domain""Also known as **guest** domains, 
domUs are the counterparts to dom0.",,
+Donate,,,,
+Donate Page,,,,
+Donor (n),Noun,,,
+Double-check,Verb,[Signal],,
+Download,Verb,,,
+Downloading,,,,
+Downloads,Noun,,,
+Drag and Drop,Noun,,السحب والإفلات,
+Drawer,Noun,"A UI design pattern that consist on a lateral, hidden menu that 
can be brought into view usually by tapping an ""hamburguer"" icon or swiping 
from the left.",,
+DuckDuckGo,Noun,Name of an open source search engine.,,
+Dump,Noun,,,
+Dump,Verb,,,
+EPUB Reader,Noun,,,
+Eavesdropping,Noun,,,
+Edge,Noun,,,
+Edge server,Noun,,,
+Email Subject,Noun,[Globaleaks],,
+Encrypted,Verb,[Globaleaks],مشفّر,
+Ensure,Verb,,تأكد,
+Enter,,,,
+Event,Noun,,حالة,
+External drive,Noun,,,
+Extra text,Noun,,نص زائد,
+FAI satellite,Noun,,,
+FAQ,Noun,[Orbot] “Frequently Asked Questions”,الأسئلة 
الشائعة,
+FOSS,Noun,Free and open-source software,,
+FTP (File Transfer Protocol),Noun,"An old method for copying files from a 
local computer to a remote one, or vice versa. The job of FTP programs (and the 
FTP servers that stored the files) have mostly been replaced by web browsers 
and web servers, or file synchronising programs like Dropbox.
+Synonyms: FTP server, File Transfer Protocol. (Source: EFF)",بروتوكول 
نقل الملفات (FTP),"""أسلوب قديم لنسخ الملفات من 
كمبيوتر محلي إلى آخر بعيد، أو بالعكس. مهمة 
برامج FTP (وسيرفرات FTP التي تخزن البيانات) 
استبدلتها المتصفحات ومخدمات الويب، أو خدم
ات مزامنة الملفات مثل Dropbox."" (EFF)"
+FTP server,Noun,"An old method for copying files from a local computer to a 
remote one, or vice versa. The job of FTP programs (and the FTP servers that 
stored the files) have mostly been replaced by web browsers and web servers, or 
file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer 
Protocol) (Source EFF)",,
+Face ID,Noun,[Signal] Specific to iOS,,
+Fallback,Adjective,[Globaleaks],,
+Fallback,Noun,[Orbot] [Globaleaks],,
+Favicon,Noun,"A favicon, also known as a shortcut icon, website icon, tab 
icon, URL icon, or bookmark icon, is a file containing one or more small icons, 
associated with a particular website or web page.",,
+Feedback,Noun,,,
+File fingerprint,Noun,"A sequence or letters or numbers that represent the 
contents of a file. Changing the file even a tiny bit will completely change 
its fingerprint. Checking the fingerprint of a file that you've downloaded, 
such as a software application or extension, helps to make sure that you got 
the same file that other people have, and that nobody has tampered with it 
while it was being downloaded.
+Synonyms: file hash value.
+Source EFF.",بصمة,"""تتكون مفاتيح التشفير بالم
فتاح العمومي من أرقام كبيرة جداً، يتجاوز 
طولها أحياناً ألف رقم أو أكثر. البصمة هي رقم 
أصغر بكثير أو مجموعة من الأرقام والأحرف 
التي يمكن استخدامها كاسم فريد لذلك الم
فتاح، دون الحاجة لسرد كافة الأرقام. فعلى 
سبيل المثال، إذا كنت ترغب بالتأكد مع صديقك م
ن استخدامكما لنفس المفتاح، يمكنكما إما أن 
تقضيا وقتاً طويلاً لقراءة المئات من الأرقام
 التي تكوّن المفتاح، إو بإمكان كل منكما أن 
يقوم بحساب بصمة مفتاحه ومقارنتها عوضاً عن 
ذلك. عادة ما تتألف البصمات التي تقدمها برام
ج التشفير من حوالي 40 حرفاً ورقماً. إذا تفحصت 
بص
 مة بعناية للتأكد من احتوائها القيمة 
الصحيحة، ستكون آمناً من انتحال الشخصية بم
فتاح مزيف. قد تقدم بعض الأدوات البرمجية 
طرقاً بديلة أكثر سهولة للتحقق من مفتاح أحد 
الأصدقاء، ولكن من المهم إجراء التحقق بشكل م
ا لمنع مقدمي خدمات الاتصالات من التنصت 
بسهولة."" (EFF)"
+File hash value,Noun,"A sequence or letters or numbers that represent the 
contents of a file. Changing the file even a tiny bit will completely change 
its fingerprint. Checking the fingerprint of a file that you've downloaded, 
such as a software application or extension, helps to make sure that you got 
the same file that other people have, and that nobody has tampered with it 
while it was being downloaded.
+Synonyms: File fingerprint.
+Source EFF.",,
+File system,Noun,"Where data is stored, usually locally, on your computer or 
other device. File systems are usually where personal documents and notes are 
stored for easy access.
+Source EFF.",,
+Firefox,Noun,,فَيَرْفُكْسْ,
+Firewall,Noun,"A tool that protects a computer from unwanted connections to or 
from local networks and the Internet. A firewall might have rules that forbid 
outgoing email, or connections to certain websites. Firewalls can be used as a 
first line of defense to protect a device from unexpected interference. Or they 
can be used to prevent users from using the Internet in certain ways. (Source: 
EFF)",جدار الحماية,
+FirewallVM,Noun,"[Qubes] ""Firewall Virtual Machine""A type of ProxyVM which 
is used to enforce network-level policies (a.k.a. ""firewall rules"").",,
+Firewalled,Adjective,,,
+Firmware,Noun,,,
+Fit,,,,
+Folder Options,Noun,,,
+Form,Noun,,استمارة,
+Form 990,,,,
+Forward Secrecy,Noun,"A property of a secure messaging system which ensures 
that your past communications can remain secure even if one of the private keys 
is stolen later. For HTTPS websites, forward secrecy is an important protection 
against adversaries like intelligence agencies which may record large amounts 
of traffic and use a stolen key to decrypt it. For  messaging and chat systems, 
forward secrecy is necessary to ensure that deleted messages are really 
deleted, but you will also need to either disable logging or securely delete 
past messages.
+Synonyms: Perfect forward secrecy.
+Source EFF.",,
+Frequently Asked Questions,Noun,“FAQ”,,
+Full disk encryption,Noun,"If you're planning on securing data on your local 
device, you could choose to just encrypt a few key files, or you could encrypt 
everything on the computer. “Full disk encryption” is the term for 
encrypting everything. It's usually safer (and often easier) to use full disk 
encryption than to manage just a few individually encrypted files. If you try 
to encrypt just individual files, your computer might make temporary 
unencrypted copies of those files without you noticing. And some software might 
keep some unencrypted records about your use of your computer. Apple's OS X, 
Linux and high-end versions of Windows all have built-in full disk encryption, 
but it is usually not turned on by default.
+Source EFF.",تعمية قرص بأكمله,"""إذا كنت تخطط لحم
اية البيانات على جهازك المحلي، يمكنك أن 
تختار تشفير بضعة ملفات هامة فقط، أو تشفير 
كل شيء على الجهاز. ""تشفير القرص بأكمله"" م
صطلح لتشفير كل شيء. عادة تشفير القرص بأكمله 
أكثر أمناً (وسهولة) من إدارة بضعة ملفات م
شفرة فقط. إذا جربت تشفير بضعة ملفات، قد يحوي 
جهازك نسخاً مؤقتة غير مشفرة من تلك الملفات 
دون أن تدري. وقد تحتفظ بعض البرامج بسجلات 
غير مشفرة حول استخدامك للكمبيوتر. ماك OS X 
ولينوكس والنسخ الاحترافية من ويندوز تحوي جم
يعاً تشفير القرص كاملاً بشكل مدمج، ولكن الم
يزة غير مفعلة بشكل افتراضي."" (EFF)"
+Fully Qualified Domain Name,Noun,See 
https://en.wikipedia.org/wiki/Fully_qualified_domain_name,,
+Functionality,Noun,,,
+GC,Noun,Garbage collector,,
+GDPR,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en";,,
+GFW,Noun,,,
+GIF,Noun,Graphics Interchange Format [Signal],,
+GNU General Public License,Noun,,,
+GPG,Noun,"""Gnu Privacy Guard"" GPG is a free software that implements OpenPGP 
specification",,
+Garbage data,Noun,,,
+Garlic,Noun,https://en.wikipedia.org/wiki/Garlic_routing,,
+Garlic routing,Noun,https://en.wikipedia.org/wiki/Garlic_routing,,
+General Data Protection Regulation,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en";,,
+Get,,,,
+Get Access Mode,Noun,[Lantern],,
+GetTor,Noun,[Orbot] [Tor],,
+Getting Started,Noun,,,
+Ghost,Noun,"[Peerio] ""Ghost"" is used as a proper noun in Peerio for a 
feature that allows users to send messages and files to a non-Peerio user via 
email or URL. This URL can be accessed with a secret passphrase and decrypted 
in the browser.
+
+""I sent you a (Peerio) Ghost""",,
+Giant Rabbit,,,,
+Give Access Mode,Noun,[Lantern],,
+GlobaLeaks,Noun,[Globaleaks] Name of application. Do not translate.,,
+Glossary,Noun,,,
+Go Back,Verb,,,
+Google,Verb,Company Name (Reference Google.com for appropriate transcription 
if applicable),,
+Google Captcha,Noun,,,
+Google Chrome,Noun,,جوجل كْرُومْ,
+Google Drive,Noun,,,
+Google Play Store,Noun,[Signal],,
+Got Skills,,,,
+Graceful Shutdown,Noun,[I2P],,
+Gracefully,Adverb,,,
+Graph,Noun,,,
+Graph,Verb,,,
+Great Firewall of China,Noun,,,
+Grid,Noun,,شبكة,
+Guardian Project,Noun,,,
+HQ,Noun,,,
+HRD,Noun,Human Rights Defence,,
+HTTP,Noun,"[Orbot] ""The Hypertext Transfer Protocol (HTTP) is an application 
protocol for distributed, collaborative, and hypermedia information systems. 
HTTP is the foundation of data communication for the World Wide Web."" - 
Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol)",,
+HTTP Header Field Manipulation,Noun,,,
+HTTP Invalid Request Line,Noun,,,
+HTTPS,Noun,"""HTTPS (also called HTTP over Transport Layer Security [TLS], 
HTTP over SSL, and HTTP Secure) is a communications protocol for secure 
communication over a computer network which is widely used on the Internet. 
HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within 
a connection encrypted by Transport Layer Security, or its predecessor, Secure 
Sockets Layer. The main motivation for HTTPS is authentication of the visited 
website and protection of the privacy and integrity of the exchanged data."" - 
Wikipedia (https://en.wikipedia.org/wiki/HTTPS)",HTTPS,"""إذا رأيت 
عنوان موقع مكتوباً بشكل كامل مثل 
“http://www.example.com/” فبلا شك ستميز جزء “http” م
نه. HTTP أي (hypertext transfer protocol) ""بروتوكول نقل 
النص الفائق"" هو الطريقة التي يتحدث بها م
تصفح الإنترنت على جهازك مع مخدم ويب بعيد. 
للأسف، يرسل http اÙ
 „عادي النص بشكل غير آمن عبر الإنترنت. يستخدم
 HTTPS (حيث S تشير لـSecure أي ""آمن"") التشفير لحم
اية البيانات التي ترسلها لمواقع الإنترنت 
والبيانات ترسلها لك بشكل أفضل من عيون الم
تلصصين."" (SSD)"
+HTTPS Everywhere,Noun,,HTTPS في كل مكان,
+HTTPS certificate,Noun,,,
+HVM,Noun,"[Qubes] ""Hardware Virtual Machine""Any fully virtualized, or 
hardware-assisted, VM utilizing the virtualization extensions of the host 
CPU.",,
+Hardcoded,Verb,,,
+Hardware,Noun,,عتاد,
+Headline,Noun,,,
+Heart of Internet Freedom,,,,
+Heart of Internet Freedom T-Shirt,,,,
+Heartbeat,Noun,,,
+Help,Noun,[Orbot],,
+Hidden,Adjective,,,
+Hidden Service,Noun,[Orbot],,
+Homepage,Noun,[Globaleaks],,
+Hop,Noun,,,
+Hosting provider,Noun,,,
+Hotspot,Noun,,,
+Housekeeping,Noun,,,
+I/O,Noun,Input/ouput,,
+I2P,Noun,[I2P] Name of application. Do not translate.,,
+ID,Noun,[Mailvelope],,
+IDE,Noun,,,
+IMAP settings,Noun,"IMAP is the way that many email programs communicate with 
services that send, receive and store your email. By changing the IMAP settings 
on your email program, you can choose to load email from different servers or 
set the level of security and encryption used to transfer the mail across the 
Internet to you.
+Source EFF.",إعدادات IMAP,إن IMAP هي الطريقة التي 
يتواصل بها العديد من برامج البريد 
الإلكتروني مع المخدمات التي ترسل وتستقبل 
وتخزن البريد الإلكتروني. بتغيير إعدادات IMAP 
على برنامج البريد الإلكتروني يمكنك اختيار 
تحميل البريد الإلكتروني من مخدمات مختلفة 
أو ضبط مستوى الأمان والتشفير المستخدم لنقل 
البريد عبر الإنترنت إليك.
+IP address,Noun,"[Orbot] A device on the Internet needs its own address to 
receive data, just like a home or business needs a street address to receive 
physical mail. This address is its IP (Internet Protocol) address. When you 
connect to a web site or other server online, you usually reveal your own IP 
address. This doesn't necessarily reveal either your identity (it's hard to map 
an IP address to a real address or a particular computer). An IP address can 
give away some information about you, however, such as your rough location or 
the name of your Internet Service Provider. Services like Tor let you hide your 
IP address, which helps give you anonymity online. (Source EFF)",,
+IP addresses,Noun,,,
+ISP (Internet Service Provider),Noun,ISP,,
+Immediate,Adjective,,,
+Implement,Verb,,,
+Inbound,Adjective,,,
+Include Private Data,Verb,,,
+Indicators of compromise,Noun,"Clues that show that your device may have been 
broken into or tampered with.
+Source EFF.",,
+Intermediate Certificate,Noun,,,
+Internal storage,Noun,"Non volatile memory used in devices, mobile or else.",,
+Internet,Noun,[Signal],إنترنت,
+Internet filtering,Noun,Filtering is the politer term for blocking or 
censoring Internet traffic. (Synonyms: blocking) (Source: EFF),,
+Introduce,Verb,,,
+Introducer,Noun,,,
+Introduction,Noun,,,
+Invalid,,,,
+Item,Noun,,,
+JRE,Noun,Synonym: Java Runtime Environment,,
+JS,Noun,,جَافَاسْكْرِبْتْ,
+Java Runtime Environment,Noun,Synonyme : JRE,,
+Javascript,,,,
+Javascript,Noun,,جَافَاسْكْرِبْتْ,
+Join,Verb,,,
+Journalists,,,,
+KB,Noun,[Orbot] kilobyte,,
+KB/s,Noun,,,
+"KB/s, Kbps",Noun,,,
+KBps,Noun,,,
+"Kbps, KB/s",Noun,[Orbot] kilobytes per second,,
+Key,Noun,,,
+Key Backup,Noun,[Martus],ملف المفتاح الاحتياطي,
+Key Exchange,Noun,,تبادل المفاتيح,
+Key fingerprint,Noun,"A sequence of letters or numbers that represent a public 
key. Some privacy tools let you check the match between someone's key 
fingerprint as seen by your device and by their device. The purpose of this 
check is to prevent a man-in-the-middle attack, where someone tricks you into 
using the wrong key.
+Source EFF.",,
+Key verification,Noun,"In public key cryptography, each person has a set of 
keys. To send a message securely to a particular person, you encrypt your 
message using their public key. An attacker may be able to trick you into using 
their key, which means that they will be able to read your message, instead of 
the intended recipient. That means that you have to verify that a key is being 
used by a particular person. Key verification is any way that lets you match a 
key to a person.
+Source EFF.",توثق من المفاتيح,"""في علم تشفير الم
فاتيح العلنية (أو العمومية)، لكل شخص مجموعة 
خاصة من المفاتيح. لإرسال رسالة بسرية لشخص م
عين، تشفر رسالتك باستخدام مفتاحهم العلني. 
قد يتمكن مهاجم من خداعك لاستخدام مفتاحه مما 
يعني أنه سيقدر على قراءة رسالتك عوضاً عن الم
تلقي المقصود. وذلك يعني أنه يتوجب عليك 
التحقق من أن المفتاح يعود للشخص المطلوب 
فعلاً. التحقق من المفاتيح هو أي وسيلة تمكنك 
من ربط مفتاح معين بشخص ما."" (EFF)"
+Key-signing party,Noun,"When you're using public key encryption, it's 
important to be sure that the key you use to encrypt a message really belongs 
to the recipient (see key verification). PGP makes this a little easier by 
having a way to tell others ""I believe this key belongs to this person -- and 
if you trust me, you should believe that too."" Telling the world that you 
trust someone's key is called ""signing their key"": it means anyone who uses 
that key can see you vouched for it. To encourage everyone to check and sign 
each others keys, PGP users organize key-signing parties. They're almost, but 
not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to 
other friends.
+Synonyms: cryptoparty.
+Source EFF.",,
+Keyboard,Noun,[Signal],,
+Keyboard Layout,Noun,,,
+Keylogger,Noun,"A malicious program or device that records everything you type 
into a device, including passwords and other personal details, allowing others 
to secretly collect that information. (The ""key"" in keylogger refers to the 
keys you have on your keyboard.) Keyloggers are often malware that users have 
been tricked into downloading and running, or occasionally physical hardware 
secretly plugged into a keyboard or device.
+Source EFF.",,
+Language pack,Noun,,حزمة اللغات,
+Lantern,Noun,[Lantern] Application Name (https://getlantern.org),,
+Lantern Cloud Server,Noun,[Lantern] “Lantern” is the name of an 
application. (https://getlantern.org),,
+Last Name,,,,
+Launcher,Noun,,,
+Leak,Noun,Synonym: data leakage,,
+Lease,Noun,,,
+Leaseset,Noun,,,
+Let's Encrypt,Noun,Don't translate this. For more info see 
https://en.wikipedia.org/wiki/Let%27s_Encrypt,,
+License Agreement,Noun,[Globaleaks],,
+Linked Identity,Noun,,,
+List,Noun,,قائمة,
+Listen,Verb,,,
+Live CD,Noun,,,
+Live ISO,Noun,,,
+Live OS,Noun,,,
+Live System,Noun,,,
+Live USB,Noun,,,
+Login page,Noun,,,
+MB,Noun,[Orbot] megabyte,,
+MBR,Noun,,,
+MIME,Noun,[Signal],,
+MISP (Malware Information Sharing Platform),Noun,"[SES] ""The MISP threat 
sharing platform is a free and open source software helping information sharing 
of threat intelligence including cyber security indicators.
+A threat intelligence platform for gathering, sharing, storing and correlating 
Indicators of Compromise of targeted attacks, threat intelligence, financial 
fraud information, vulnerability information or even counter-terrorism 
information."" -http://www.misp-project.org/";,,
+MITM,Noun,"Suppose you believe you were speaking to your friend, Bahram, via 
encrypted  messenger. To check it's really him, you ask him to tell you the 
city where you first met. ""Istanbul"" comes the reply. That's correct! 
Unfortunately, without you or Bahram knowing, someone else online has been 
intercepting all your communications. When you first connected to Bahram, you 
actually connected to this person, and she, in turn, connected to Bahram. When 
you think you are asking Bahram a question, she receives your message, relays 
the question to Bahram, receives his answer back , and then sends it to you. 
Even though you think you are communicating securely with Bahram, you are, in 
fact, only communicating securely with the spy, who is also communicating 
securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can 
spy on communications or even insert false or misleading messages into your 
communications. Security-focused internet communications software needs to de
 fend against the man-in-the-middle attack to be safe against attackers who 
have control of any part of the Internet between two communicators.
+Synonyms: Man-in-the-middle attack.
+Source EFF.",,
+MM,Noun,,,
+MMS,Noun,“Multimedia Messaging Service (MMS) is a standard way to send 
messages that include multimedia content to and from a mobile phone over a 
cellular network.” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service 
[Signal],,
+MMSC,Noun,Multimedia Messaging Service Center. A mobile network operator's 
store and forward server for relaying MMS (Multimedia Messaging Service) 
messages. [Signal],,
+Magic Word,Noun,,كلمة سحرية,
+Mail routes,Noun,,,
+Maintainer,Noun,,,
+Malformed,Adjective,,,
+Malicious,Adjective,,,
+Malicious software,Noun,"Malware is short for malicious software: programs 
that are designed to conduct unwanted actions on your device. Computer viruses 
are malware. So are programs that steal passwords, secretly record you, or 
delete your data.
+Synonyms: Malware.
+Source EFF.",برمجيات خبيثة,"""البرمجيات الخبيثة 
هي برمجيات مصممة للقيام بأفعال غير مرغوب 
بها على جهازك. فيروسات الكمبيوتر برمجيات 
خبيثة، كما أن البرامج التي تسرق كلمات السر 
أو تسجل أنشطتك بشكل سري أو تحذف بياناتك هي 
برمجيات خبيثة أيضاً."" (EFF)"
+Malware,Noun,"Malware is short for malicious software: programs that are 
designed to conduct unwanted actions on your device. Computer viruses are 
malware. So are programs that steal passwords, secretly record you, or delete 
your data.
+Synonyms: Malicious software
+Source EFF.",برمجيات خبيثة,"""البرمجيات الخبيثة 
هي برمجيات مصممة للقيام بأفعال غير مرغوب 
بها على جهازك. فيروسات الكمبيوتر برمجيات 
خبيثة، كما أن البرامج التي تسرق كلمات السر 
أو تسجل أنشطتك بشكل سري أو تحذف بياناتك هي 
برمجيات خبيثة أيضاً."" (EFF)"
+Man-in-the-middle attack,Noun,"Suppose you believe you were speaking to your 
friend, Bahram, via encrypted  messenger. To check it's really him, you ask him 
to tell you the city where you first met. ""Istanbul"" comes the reply. That's 
correct! Unfortunately, without you or Bahram knowing, someone else online has 
been intercepting all your communications. When you first connected to Bahram, 
you actually connected to this person, and she, in turn, connected to Bahram. 
When you think you are asking Bahram a question, she receives your message, 
relays the question to Bahram, receives his answer back , and then sends it to 
you. Even though you think you are communicating securely with Bahram, you are, 
in fact, only communicating securely with the spy, who is also communicating 
securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can 
spy on communications or even insert false or misleading messages into your 
communications. Security-focused internet communications 
 software needs to defend against the man-in-the-middle attack to be safe 
against attackers who have control of any part of the Internet between two 
communicators.
+Synonyms: MITM
+Source EFF.",,
+Manage Contacts,Noun,[Martus] Martus menu option.,إدارة جهات 
الاتصال,
+Martus Desktop,Noun,[Martus],Martus Desktop,
+Martus Desktop Application,Noun,[Martus],تطبيق Martus Desktop,
+Martus Information Management and Data Collection 
Framework,Noun,[Martus],إطار عمل Martus لإدارة المعلومات 
والتقاط البيانات,
+Martus Record Archive (*mba),Noun,[Martus],أرشيف نشرات Martus (*mba),
+Martus Report Format (.mrf),Noun,[Martus],نسق تقرير Martus (.mrf),
+Martus Search Specification,Noun,[Martus],مواصفات بحث Martus,
+"Master Boot Record, MBR",Noun,,,
+Master password,Noun,"A password used to unlock a store of other passwords or 
other ways to unlock programs or messages. You should make a master password as 
strong as you can.
+Source EFF.",,
+Match,,,,
+Matching,Adjective,[Globaleaks],,
+Matching Conditions,,,,
+Megabytes,Noun,[Globaleaks],,
+Message Format,Noun,,نسق الرسالة,
+Message Of The Day,Noun,,,
+Mixnet,Noun,,,
+Mobile Martus,Noun,[Martus],Mobile Martus,
+Multihome,Noun,,,
+Multihoming,Noun,,,
+My Computer,Noun,The user’s home folder in some operating systems.,,
+NAT,Noun,Network Address Translation,,
+NGO,Noun,Non-Governmental Organization,منظمات غير حكومية,
+NGOs,,,,
+NSA,,,,
+Name,Noun,,,
+Naming service,Noun,,,
+Navegador Tor,Noun,,,
+NetDB,Noun,network database,,
+NetVM,Noun,"""Network Virtual Machine""A type of VM which connects directly to 
a network and provides access to that network to other VMs which connect to the 
NetVM.",,
+Network database,Noun,,,
+Network drive,Noun,,,
+New,Adjective,,,
+Newsletter,Noun,,,
+Next,Noun,“Next” button,,
+No,Noun,,,
+Node,Noun,,,
+Non-Tor,Noun,,,
+Notes,,,,
+OK,Noun,[Signal] “OK” button which can also be translated as “Accept”,,
+OPML,Noun,"Outline Processor Markup Language
+
+""OPML (Outline Processor Markup Language) is an XML format for outlines 
(defined as ""a tree, where each node contains a set of named attributes with 
string values""). Originally developed by UserLand as a native file format for 
the outliner application in its Radio UserLand product, it has since been 
adopted for other uses, the most common being to exchange lists of web feeds 
between web feed aggregators.""
+- https://en.wikipedia.org/wiki/Opml";,,
+OS,Noun,Operating system,,
+OTR,Noun,Off The Record,,
+Observatory,Noun,,المرصد,
+Off,Adjective,,,
+Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a 
way of adding encryption to them, so that you can keep using familiar networks 
like Facebook chat, Google Chat or Hangouts but with your messages more 
resistant to surveillance. The OTR cryptographic protocol provides strong 
encryption for  messaging conversations. (Synonyms : OTR) (Source EFF)",,
+Oil pipeline,Noun,,,
+On,Preposition,,,
+One-time password,Noun,"Passwords are usually semi-permanent: once you set 
them up, you can keep using them until you manually change or reset them. 
One-time passwords only work once. Some one-time password systems work by 
having a tool or program that can create many different one-time passwords, 
that you use in turn. This is useful if you're afraid that there may be a 
key-logger on a system where you have to type in a password.
+Source EFF.",,
+Onion,Noun,[Tor],,
+Onion Address,Noun,[Tor],,
+Onion Browser,Noun,[Tor],,
+Onion Circuits,Noun,[Tor],,
+Onion routing,Noun,[Tor],,
+Open Observatory of Network Interference,,,,
+Open Observatory of Network Interference (OONI) ,,,,
+Open Observvatory of Network Interference (OONI),,,,
+Open Source,,,,
+Open Whisper Systems,Noun,Organization name. Do not translate. [Signal],,
+Open-source software,Noun,"Open source software, or free software, is software 
that can be distributed freely in a form that lets others modify it and rebuild 
it from scratch. While it is known as “free software,"" it's not necessarily 
free as in zero-cost: FLOSS programmers can ask for donations, or charge for 
support or for copies. Linux is an example of a free, open source program, as 
are Firefox and Tor.
+Synonyms: FLOSS, free, libre and open-source software, free software
+Source EFF.",البرمجيات الحرة والمصدر الم
شاعي,"البرمجيات مفتوحة المصدر - أو البرم
جيات الحرة - هي برمجيات يمكن توزيعها بحرية 
بشكل يسمح للآخرين بتعديلها وإعادة تكوينها م
جدداً. في حين أنها حرة فقد لا تكون ""مجانية"": 
مبرمجو FLOSS يمكن لهم طلب التبرعات أو تقاضي 
أجرة لتقديم الدعم أو لبعض النسخ. لينوكس م
ثال على برنامج حر مفتوح المصدر، مثل 
فايرفوكس وتور Tor."
+OpenPGP,Noun,OpenPGP is a open specification and standard that implements PGP 
(Pretty Good Privacy),,
+OpenPGP key,Noun,,,
+Operating System (OS),Noun,"A program that runs all the other programs on a 
computer. Windows, Android and Apple's OS X and iOS are all examples of 
operating systems. (Source: EFF)(Synonym: OS) [Signal]",,
+Optional Setup,Noun,,,
+Orbot,Noun,[Orbot] Name of application. Do not translate.,,
+Oudated,Adjective,,,
+Out-of-band verification,Noun,"""Out-of-band"" means any way of communicating 
outside of the current method. Verifying the identity of the person you're 
talking to over an insecure communication system often requires communicating 
out-of-band via another method that is less vulnerable to the same kind of 
attack. So, for instance, you might check that you are using someone's correct 
public key by talking to them in person, before using it to encrypt your email.
+Synonyms: out-of-band
+Source EFF.",التوثيق خارج الحزمة,"""خارج الحزمة"" 
يعني أي وسيلة للتواصل خارج الأسلوب المستخدم
 حالياً. التحقق من هوية شخص تتحدث معه عبر 
نظام اتصالات غير آمن غالباً ما يتطلب 
التواصل خارج الحزمة باستخدام أسلوب آخر أقل 
عرضة لنفس النوع من الهجوم. لذا على سبيل الم
ثال، قد ترغب بالتحقق من أنك تستخدم المفتاح 
العلني الصحيح لشخص ما بالتحدث معه وجها لوجه 
قبل استخدام المفتاح لتشفير رسائلك إليه."
+Outdated,Adjective,,,
+Overhead,Noun,,,
+Overlay network,Noun,,,
+Overview,Noun,[Globaleaks],,
+P.O. Box,Noun,,,
+PDF,Noun,,,
+PGP,Noun,"""Pretty Good Privacy"" PGP is a commercial software for 
cyphering",PGP,"كان PGP (أي Pretty Good Privacy ""خصوصية جيدة 
جداً"") من أول التطبيقات الشعبية للتشفير 
باستخدام المفتاح العلني. كتب فِل زيمرمان 
البرنامج في 1991 لمساعدة الناشطين وغيرهم على 
حماية اتصالاتهم. حققت معه رسمياً حكومة 
الولايات المتحدة عندما انتشر البرنامج خارج 
الولايات المتحدة. كان تصدير الأدوات التي 
تتضمن تشفيراً قوياً عبر المفتاح العلني أم
راً غير قانوني في ذاك الوقت. يتابع PGP وجوده 
كأداة برمجية تجارية. ويتوفر تطبيق حر لنفس 
المعيار الذي يستخدمه PGP ويدعى GnuPG (أو GPG). 
ولأن الإثنين يستخدمان نفس المقاربة، كثيراً 
ما يقول الØ
 ¨Ø¹Ø¶ أنهم يستخدمون مفتاح PGP أو يرسلون رسالة 
PGP حتى وإن كانوا يستخدمون GnuPG."
+PIN,Noun,Personal Identification Number [Signal],,
+PV,Noun,"[QubesOS] ""Paravirtualization""An efficient and lightweight 
virtualization technique originally introduced by the Xen Project and later 
adopted by other virtualization platforms.",,
+PVHVM,Noun,"[QubesOS] ""Paravirtualization on Hardware Virtual Machine""To 
boost performance, fully virtualized HVM guests can use special paravirtual 
device drivers (PVHVM or PV-on-HVM drivers).",,
+Padding,Noun,,,
+Page Report,Noun,Type of report generated by Martus - not one page of a 
report.,صفحة التقرير,
+Pane,Noun,,جزء,
+Panic,Noun,"Panic button, panic app",,
+Passive adversary,Noun,"A passive adversary is one that can listen to your 
communications, but cannot directly tamper with them.
+Source EFF.",,
+Passphrase,Noun,,,
+Password manager,Noun,"A tool that can encrypt and store your passwords using 
a single master password making it practical to use many different passwords on 
different sites and services without having to memorize them.
+Synonyms: Secure password database; password safe.
+Source EFF.",,
+Password safe,Noun,"A tool that can encrypt and store your passwords using a 
single master password making it practical to use many different passwords on 
different sites and services without having to memorize them.
+Synonyms: Secure password database, Password manager.
+Source EFF.",,
+Passwords field,Noun,,,
+Passwords field ,Noun,,,
+Peer-to-Peer (P2P),Adjective,,,
+Perfect forward secrecy,Noun,"A property of a secure messaging system which 
ensures that your past communications can remain secure even if one of the 
private keys is stolen later. For HTTPS websites, forward secrecy is an 
important protection against adversaries like intelligence agencies which may 
record large amounts of traffic and use a stolen key to decrypt it. For  
messaging and chat systems, forward secrecy is necessary to ensure that deleted 
messages are really deleted, but you will also need to either disable logging 
or securely delete past messages.
+Synonyms: Forward secrecy.
+Source EFF.",السرية المستقبلية,خاصية من خواص نظم 
التراسل الآمن تضمن أن اتصالات السابقة 
ستبقى آمنة حتى في حال تمت سرقة أحد المفاتيح 
الخاصة لاحقاً. إن السرية المستقبلية حماية 
هامة لمواقع HTTPS ضد الخصوم مثل وكالات 
الاستخبارات والتي قد تسجل كماً ضخماً من م
رور شبكة الإنترنت وتستخدم مفتاحاً مسروقاً 
لفك تشفيره. للتراسل المباشر وأنظمة 
الدردشة، فإن السرية المستقبلية ضرورية لضم
ان أن الرسائل المحذوفة تحذف فعلاً، ولكنك 
ستحتاج إما لـ فصل السجل أو حذف الرسائل 
السابقة بشكل آمن.
+Permalink,Noun,,,
+Persistence wizard,Noun,,,
+Persistent Storage,Noun,,,
+Personal information,Noun,,,
+Photo story,Noun,,,
+Phrases,Noun,,,
+Pie Chart,Noun,[Martus],مخطط دائري,
+Piece,Noun,,,
+Plaintext,Noun,[Globaleaks] [Signal],نص صِرف,
+Plan,Noun,,,
+Plans,Noun,,,
+Platform,Noun,[Globaleaks],,
+Please,Adverb,,,
+Pledge,,,,
+Pluggable Transport,Noun,,,
+Pluggable Transports,Noun,,,
+Pluggable Transports Bundle,Noun,,,
+Policy,Verb,,,
+Pool,Noun,,,
+Post,Noun,,,
+Post,Verb,,,
+Post-traumatic stress,Noun,,,
+Posted,Verb,,,
+Power Off,Verb,,,
+Powering,,,,
+Powering Digital Resistance,,,,
+Powering Digital Resisteance,,,,
+Preparation,Noun,,,
+Pretty Good Privacy,Noun,"PGP or Pretty Good Privacy was one of the first 
popular implementations of public key cryptography. Phil Zimmermann, its 
creator, wrote the program in 1991 to help activists and others protect their 
communications. He was formally investigated by the US government when the 
program spread outside the United States. At the time, exporting tools that 
included strong public key encryption was a violation of US law.
+PGP continues to exist as a commercial software product. A free implementation 
of the same underlying standard that PGP uses called GnuPG (or GPG) is also 
available. Because both use the same interchangeable approach, people will 
refer to using a “PGP key” or sending a “PGP message”, even if they are 
using GnuPG. (Synonyms: PGP) (Source: EFF)",,
+Primary,Noun,,أوَّلى,
+Procedure,,,,
+Proceed,Verb,,,
+Projects,Noun,,,
+Promote,,,,
+Protect,,,,
+Protocol,Noun,"A communications protocol is a way of sending data between 
programs or computers. Software programs that use the same protocol can talk to 
each other: so web browsers and web servers speak the same protocol, called 
""http"". Some protocols use encryption to protect their contents. The secure 
version of the http protocol is called ""https"". Another example of an 
encrypted protocol used by many different programs is OTR (Off-the-Record), a 
protocol for secure instant messaging.
+Source EFF.",بروتوكول,"""إن أي بروتوكول للاتصال 
هو وسيلة لإرسال البيانات بين البرامج أو 
الكمبيوترات. تستطيع البرمجيات التي تستخدم 
نفس البروتوكول أن تتواصل مع بعضها بعضاً: 
تتكلم المتصفحات ومخدمات الإنترنت نفس 
البروتوكول ويدعى ""http"". تستخدم بعض 
البروتوكولات التشفير لحماية محتوياتها. 
النسخة الآمنة من بروتوكول http تدعى ""https"".وOTR 
هو مثال آخر على بروتوكول مشفر تستخدمه 
العديد من البرامج المختلفة، وهو بروتوكول 
للتراسل المباشر الآمن."" (EFF)"
+Province,Adjective,,,
+Province,Noun,,,
+ProxyVM,Noun,"[QubesOS] ""Proxy Virtual Machine""A type of VM which proxies 
network access for other VMs",,
+Pseudonym,Noun,"A name that you choose to use in some context (like an online 
forum) and that others may come to recognize, but that isn’t connected to 
names that people know you by in your day-to-day life.
+Source EFF.",,
+PsiCash,Noun,[Psiphon],,
+Psiphon,Noun,"Name of an organization and application. Please do not translate 
this term. If needed, you can transcribe the organization / tool name. For 
example, the name is transcribed in Arabic, Persian and Amharic.",,
+Public Information File (*.mpi),Noun,[Martus] Files containing the account's 
public information,ملفات المعلومات العلنية (*.mpi),
+Public key cryptography,Noun,,,
+Public key encryption,Noun,"Traditional encryption systems use the same 
secret, or key, to encrypt and decrypt a message. So if I encrypted a file with 
the password ""bluetonicmonster"", you would need both the file and the secret 
""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to 
encrypt, and another to decrypt. This has all kinds of useful consequences. For 
one, it means that you can hand out the key to encrypt messages to you, and as 
long as you keep the other key secret, anyone with that key can talk to you 
securely. The key you hand out widely is known as the ""public key"": hence the 
name of the technique. Public key encryption is used to encrypt email and files 
by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Asymmetric key encryption, Public key cryptography.
+Source EFF.",,
+Public key servers,Noun,"If you plan to send a secure message to someone who 
uses public key cryptography like PGP, you need to know what key to use to 
encrypt your message. Public key servers act as a phonebook for such keys, 
allowing software to use an email address, name, or key fingerprint to search 
for a full key and download it. There are many PGP public key servers, but they 
usually share their key collections with each other. Keyservers can't verify 
whether the keys they publish are genuine or forgeries. Anyone can upload a key 
to a public key server—in anyone's name. That means that a key connected to a 
person's name or email on a keyserver might not be their real key. In order to 
check the authenticity of a key, you need to check its signatures, or confirm 
its fingerprint with the original user in a trustworthy way.
+
+PGP allows you to sign other people's keys, which is a way of using your own 
key to assert that a certain key is the right one to use to contact another 
person. This is meant to provide a way of distinguishing between genuine and 
fake keys; if people sign the right keys for people they know and communicate 
with, others can use those signatures to confirm that the genuine keys are 
genuine. When you download a key from a key server, it may include signatures 
from other people who affirm that it's the right one. If you know those people 
and know that you have the right key for them, you can have more confidence in 
the newly downloaded key. This verification process is also called the web of 
trust. Its advantage is that it's decentralized and not controlled by any 
authority, so you don't have to believe a certain company or government about 
which keys to use when writing to new people. Instead, you can believe your own 
social networks. One important disadvantage of the web of trust is t
 hat publishing signatures for other people's keys tells the whole world who 
your contacts are; it creates public evidence that you know particular people. 
Also, using the web of trust correctly requires a good deal of time and 
attention, and some communities rarely or never participate. (Source: EFF)",,
+Q&A,Noun,,,
+QR Code,,,,
+QR code,Noun,[Signal] [Orbot],,
+"QR code, code",Noun,[Signal],,
+Qubes Global Settings,Noun,[QubesOS],,
+Qubes OS,Noun,"[QubesOS] Do not translate ""Qubes OS""",,
+Query,Noun,,,
+Questionnaire,,,,
+RAM,Noun,,,
+RMI,Noun,,,
+ROM,Noun,[Signal],,
+Randomization,Noun,,,
+Rate,Noun,,,
+Read,Verb,,,
+ReadMe,Noun,The ReadMe file included with any new software release that 
describes changes to software,اقرأني (ملف),
+Reboot,Noun,,,
+Reboot,Verb,,,
+Record ID,Noun,,رقم تسجيل,
+Reference Guide,Noun,,دليل الإرشادات,
+Referer,Noun,,,
+Referer spoofing,Noun,,,
+Refresh,Noun,,,
+Refresh,Verb,,,
+Registration Lock,Noun,[Signal],,
+Reject,Verb,,,
+Release key,Noun,,,
+Removable media,Noun,,,
+Removable media drive,Noun,,,
+Repliable datagram,Noun,,,
+Required,Adjective,,,
+Reseed,Verb,,,
+Retry,Verb,,,
+Retweet,Noun,,,
+Retweet,Verb,,,
+Reusable Choice,Noun,,اختيار قابل لإعادة الإستخدام,
+Revocation certificate,Noun,"What happens if you lose access to a secret key, 
or it stops being secret? A revocation certificate is a file that you can 
generate that announces that you no longer trust that key. You generate it when 
you still have the secret key, and keep it for any future disaster.
+Source EFF.",,
+Reward,Noun,,,
+Rich Text,Noun,,نص وافر,
+Ring Tone,Noun,,,
+Rip,Noun,,,
+Risk analysis,Noun,"In computer security, risk analysis is calculating the 
chance that threats might succeed, so you know how much effort to spend 
defending against them. There may be many different ways that you might lose 
control or access to your data, but some of them are less likely than others. 
Assessing risk means deciding which threats you are going to take seriously, 
and which may be too rare or too harmless (or too difficult to combat) to worry 
about. See threat modeling.
+Synonyms: Risk, Risk Assessment.
+Source EFF.",تحليل الخطر,"""في أمن الكمبيوتر، 
تحليل الخطر هو حساب احتمال نجاح التهديد، 
حتى تعرف مقادر الجهد المطلوب لتدافع عن نفسك 
بمواجهتها. قد يكون هناك الكثير من الطرق 
التي قد تخسر بها السيطرة أو القدرة على 
الوصول إلى بياناتك، ولكن احتمال وقوعها 
يتفاوت. يعني تقييم الخطر أن تحدد التهديدات 
التي ستوجهها بجدية."" (EFF)"
+Risk assessment,Noun,"In computer security, risk analysis is calculating the 
chance that threats might succeed, so you know how much effort to spend 
defending against them. There may be many different ways that you might lose 
control or access to your data, but some of them are less likely than others. 
Assessing risk means deciding which threats you are going to take seriously, 
and which may be too rare or too harmless (or too difficult to combat) to worry 
about. See threat modeling.
+Synonyms: Risk, Risk analysis.
+Source EFF.",تحليل الخطر,"""في أمن الكمبيوتر، 
تحليل الخطر هو حساب احتمال نجاح التهديد، 
حتى تعرف مقادر الجهد المطلوب لتدافع عن نفسك 
بمواجهتها. قد يكون هناك الكثير من الطرق 
التي قد تخسر بها السيطرة أو القدرة على 
الوصول إلى بياناتك، ولكن احتمال وقوعها 
يتفاوت. يعني تقييم الخطر أن تحدد التهديدات 
التي ستوجهها بجدية."" (EFF)"
+Roadmap,Noun,,,
+Role-based access control,Noun,[Globaleaks],,
+Root,Noun,,,
+RouterInfo,Noun,,,
+Ruleset Tests,Noun,,,
+Running environment,Noun,,,
+Runtime,Noun,,,
+SD card,Noun,,,
+SES (Suspicious Email Submitter),Noun,[SES] Project Name. Please do not 
translate.,,
+SIM card,Noun,"A small, removable card that can be inserted into a mobile 
phone in order to provide service with a particular mobile phone company. SIM 
(subscriber identity module) cards can also store phone numbers and text 
messages.
+Source EFF.",بطاقة هاتف,"""بطاقة صغيرة يمكن 
إزالتها، ويتم إدخالها في الهواتف المحمولة 
بغرض توفير الخدمة من شركة هاتف محمول معينة. 
ويمكن لبطاقة ""السيم"" (Subscriber Identity Module) أن 
تخزن أرقام الهواتف والرسائل النصية."" (EFF)"
+SMS,Noun,"“SMS (short message service) is a text messaging service component 
of most telephone, internet, and mobile-device systems.[1] It uses standardized 
communication protocols to enable mobile devices to exchange short text 
messages.” https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal]",,
+SMTP,Noun,[Globaleaks],,
+SOCKS,Noun,"[Orbot] ""Socket Secure (SOCKS) is an Internet protocol that 
exchanges network packets between a client and server through a proxy server. 
SOCKS5 additionally provides authentication so only authorized users may access 
a server. Practically, a SOCKS server proxies TCP connections to an arbitrary 
IP address, and provides a means for UDP packets to be forwarded."" - Wikipedia 
(https://en.wikipedia.org/wiki/SOCKS)",,
+SSD (Solid-State Drive),Noun,"""A solid-state drive (SSD), or solid-state disk 
is a solid-state storage device that uses integrated circuit assemblies as 
memory to store data persistently."" 
-https://en.wikipedia.org/wiki/Solid-state_drive
+
+""Historically, computers stored data on rotating magnetic discs. Mobile 
devices and increasing numbers of personal computers now store permanent data 
on non-moving drives. These SSD drives are currently more expensive, but much 
faster than magnetic storage. Unfortunately, it can be more difficult to 
reliably and permanently remove data from SSD drives.""
+Source EFF",,
+SSH,Noun,"""Secure Shell (SSH) is a cryptographic network protocol for 
operating network services securely over an unsecured network.[1] The best 
known example application is for remote login to computer systems by users."" - 
Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell)",SSH,إن SSH أو 
(Secure SHell) هو أسلوب يسمح لك بالتحكم بكمبيوتر 
بعيد بأمان عبر واجهة سطر الأوامر. إحدى م
يزات بروتوكولSSH هي أنه يمكنك استخدامه لنقل 
حركة مرور الإنترنت بين كمبيوترين، بالإضافة 
إلى إرسال الأوامر. لإنشاء وصلة SSH، يحتاج أن 
يعمل النظام البعيد كمخدم SSH، وجهازك المحلي 
سيحتاج برنامجاً وكيلاً لـ SSH.
+SSL,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets 
Layer (SSL), both frequently referred to as ""SSL"", are cryptographic 
protocols that provide communications security over a computer network. Several 
versions of the protocols find widespread use in applications such as web 
browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). 
Websites are able to use TLS to secure all communications between their servers 
and web browsers."" - Wikipedia 
(https://en.wikipedia.org/wiki/Transport_Layer_Security)",SSL,التكنولوجيا
 التي تسمح لك أن تحافظ على اتصال آمن ومشفر 
بين كمبيوترك وبعض المواقع والخدمات على 
الإنترنت. عندما تتصل بموقع ما عبر SSL، يبدأ 
عنوان ذلك الموقع بـ HTTPS عوضاً عن HTTP.
+SSL Observatory,Noun,,مرقاب SSL,
+SVM,Noun,Support Vector Machine,,
+SVM (Support Vector Machine),Noun,"""In machine learning, support vector 
machines (SVMs, also support vector networks) are supervised learning models 
with associated learning algorithms that analyze data used for classification 
and regression analysis."" - 
https://en.wikipedia.org/wiki/Support_vector_machine";,,
+Safe-house,Noun,,,
+Satellite Provider,Noun,,,
+Screen Lock,Noun,[Signal],,
+Search,Noun,,,
+Search Engine,Noun,,,
+Search Results,Noun,Application menu item.,نتائج البحث,
+Secure Sockets Layer,Noun,,,
+Secure Sockets Layer (SSL),Noun,"The technology that permits you to maintain a 
secure, encrypted connection between your computer and some of the websites and 
Internet services that you visit. When you're connected to a website through 
this technology, the address of the website will begin with HTTPS rather than 
HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 
1999, but many people still use the old name, Secure Sockets Layer (SSL). 
(Synonyms: Transport layer security) (Source: EFF)",,
+Secure password database,Noun,"A tool that can encrypt and store your 
passwords using a single master password making it practical to use many 
different passwords on different sites and services without having to memorize 
them. (Synonyms: Password manager, password safe) (Source EFF)",,
+Security certificate,Noun,"A way to confirm automatically that a public key is 
correct (is really the one that's used by a particular entity), in order to 
prevent man-in-the-middle attacks. Most often used by web sites to prove to 
your browser that you have a secure connection to the real site, and not to 
some other system that's tampering with your connection.
+(Synonyms: Digital certificate) (Source EFF)",,
+Security question,Noun,"To supplement passwords, some systems use ""security 
questions."" These are queries to which only you are supposed to know the 
answer. The problem with security questions is that they are really just extra 
passwords that have potentially guessable or discoverable answers. We recommend 
you treat them as any other password: create a long, novel, random, phrase to 
answer them, and record that somewhere safe. So the next time your bank asks 
you your mother's maiden name, you should be ready to answer ""Correct Battery 
Horse Staple"" or similar.(Source EFF)",,
+Security token,Noun,,,
+Seed,Noun,,,
+Seeding,Noun,,,
+Select,,,,
+Select Fit,,,,
+Sensitive,Adjective,,,
+Sensor,,,,
+Server,,,,
+Servers,Verb,,,
+ServiceVM,Noun,"""Service Virtual Machine""A VM the primary purpose of which 
is to provide a service or services to other VMs.",,
+Setting,Noun,,,
+Settings,Noun,[Signal] [Orbot] Application menu item.,,
+Short User Manual,Noun,,,
+Signal,Noun,[Signal] Name of application. Do not translate.,,
+Size,,,,
+Slim,,,,
+Snowflake,Adjective,,,
+Socket,Noun,,,
+Software,Noun,,برامج,
+Solid State Drive,Noun,"Historically, computers stored data on rotating 
magnetic discs. Mobile devices and increasing numbers of personal computers now 
store permanent data on non-moving drives. These SSD drives are currently more 
expensive, but much faster than magnetic storage. Unfortunately, it can be more 
difficult to reliably and permanently remove data from SSD drives.
+Synonyms: SSD.
+Source EFF.",,
+Source code,Noun,,,
+Speed Boost,Noun,[Psiphon],,
+Standalone(VM),Noun,"[QubesOS] ""Standalone (Virtual Machine)""In general 
terms, a VM is described as **standalone** if and only if it does not depend on 
any other VM for its root filesystem.",,
+StandaloneHVM,Noun,"[QubesOS] ""Standalone Hardware Virtual Machine""Any HVM 
which is standalone (i.e., does not depend on any other VM for its root 
filesystem).",,
+Standard Fields,Noun,,حقول معيارية,
+Sticker Pack,,,,
+Stock,,,,
+Stocks,,,,
+Street Address,,,,
+Subtitle,Noun,[Globaleaks],,
+Summary,Noun,,,
+Support,,,,
+Support Vector Machine,Noun,,,
+Sure,,,,
+Surname,Noun,,,
+Sweatshirt,,,,
+Sync Manager,Noun,,مدير المزامنة,
+Sys admin,Noun,,,
+System administrator,Noun,,,
+TLS,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets 
Layer (SSL), both frequently referred to as ""SSL"", are cryptographic 
protocols that provide communications security over a computer network. Several 
versions of the protocols find widespread use in applications such as web 
browsing, email, Internet faxing,  messaging, and voice-over-IP (VoIP). 
Websites are able to use TLS to secure all communications between their servers 
and web browsers."" - Wikipedia 
(https://en.wikipedia.org/wiki/Transport_Layer_Security)",,
+TOFU,Noun,"Trust on first use:
+https://en.wikipedia.org/wiki/Trust_on_first_use";,,
+TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, 
and UNMAP in the SCSI command set) allows an operating system to inform a 
solid-state drive (SSD) which blocks of data are no longer considered in use 
and can be wiped internally."" 
https://en.wikipedia.org/wiki/Trim_(computing)",أمر حذف الكتل 
الغير مرغوبة,
+TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA 
command set, and UNMAP in the SCSI command set) allows an operating system to 
inform a solid-state drive (SSD) which blocks of data are no longer considered 
in use and can be wiped internally."" 
https://en.wikipedia.org/wiki/Trim_(computing)",,
+TTL,Noun,,مدة حياة الطرد,
+Tails,Noun,Name of the organization and tool.,تيلز,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,,
+Take a stand,,,,
+Tamanho,,,,
+TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual 
Machine""Any HVM that depends on a TemplateVM for its root filesystem.",,
+TemplateBasedVM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which 
depends on a TemplateVM for its root filesystem.",,
+TemplateHVM,Noun,"[QubesOS] ""Template Hardware Virtual Machine""Any HVM which 
functions as a TemplateVM by supplying [QubesOS] its root filesystem to other 
VMs.",,
+TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies 
its root filesystem to another VM.",,
+Terms & Privacy Policy,Noun,[Signal],,
+Text message,Noun,Synonym: SMS,,
+Thanks You,,,,
+Threat,Noun,"In computer security, a threat is a potential event that could 
undermine your efforts to defend your data. Threats can be intentional 
(conceived by attackers), or they could be accidental (you might leave your 
computer turned on and unguarded). (Source EFF)",تهديد,"""في أمن 
الكمبيوتر، التهديد هو حدث ممكن يقوض جهودك 
في الدفاع عن بياناتك. يمكن للتهديدات أن 
تكون متعمدة (ينفذها مهاجمون)، أو قد تكون 
عرضية (قد تترك جهازك مشغلاً دون أن تراقبه)."" 
(EFF)"
+Threat model,Verb,,,
+Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection 
you want for your data. It's impossible to protect against every kind of trick 
or attacker, so you should concentrate on which people might want your data, 
what they might want from it, and how they might get it. Coming up with a set 
of possible attacks you plan to protect against is called threat modeling. Once 
you have a threat model, you can conduct a risk analysis. (Synonyms: Threat 
model) (Source EFF)",,
+Throwaway,Noun,"A phone that is not connected to your identity, is only used 
for a small set of calls or activities, and can be discarded if and when it is 
suspected of being tracked or compromised. Burner phones are often pre-paid 
mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",,
+Throwaway address,Noun,"An email address you use once, and never again. Used 
to sign up to Internet services without revealing an email address connected to 
your identity.
+Source EFF.",,
+Timestamp,Noun,,,
+To date though,,,,
+Toolkit,Noun,,,
+Tools,Noun,[Martus] Martus menu option.,الأدوات,
+Tor,Noun,[Orbot],,
+Tor Blog,,,,
+Tor Blog,Noun,,,
+Tor Bridges,Noun,,,
+Tor Browser,,,,
+Tor Browser,Noun,"[Orbot] Application Name 
(https://www.torproject.org/projects/torbrowser.html.en). You can translate the 
word ""Browser"", however ensure that it is translated consistently across all 
resources and projects.",,
+Tor Browser Bundle,Noun,,,
+Tor Browser profile directory,Noun,,,
+Tor News,Noun,,,
+Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be 
transcribed dependent on language.,,
+Tor bridge,Noun,,,
+Tor messenger,Noun,[The Tor Project],,
+Tor network,Noun,,,
+Tor relay,Noun,[Tor] [Orbot],,
+Torbutton,Noun,,,
+Touch ID,Noun,[Signal] Specific to iOS,,
+Trademark,Noun,,,
+Twitter,,,,
+Two-Factor,Noun,,,
+UI,Noun,user interface,,
+URL,Noun,,عنوان,
+US $,Noun,"""USD"" or ""United States Dollar""",,
+USB drive,Noun,Specifically thumbdrives used as external storage.,,
+USB stick,Noun,,,
+UpdateVM,Noun,[QubesOS],,
+Uploaded,Adjective,[Globaleaks],,
+UsbVM,Noun,[QubesOS],,
+VM,Noun,"""virtual machine""",,
+VPN,Noun,"A virtual private network is a method for connecting your computer 
securely to the network of an organization on the other side of the Internet. 
When you use a VPN, all of your computer's Internet communications is packaged 
together, encrypted and then relayed to this other organization, where it is 
decrypted, unpacked, and then sent on to its destination. To the organization's 
network, or any other computer on the wider Internet, it looks like your 
computer's request is coming from inside the organization, not from your 
location. VPNs are used by businesses to provide secure access to internal 
resources (like file servers or printers). They are also used by individuals to 
bypass local censorship, or defeat local surveillance.
+Synonyms: Virtual Private Network
+Source: EFF",,
+Vanilla Bridges,Noun,,,
+Vidalia,Noun,,,
+Virtual Machine (VM),Noun,"A software implementation of a machine (for 
example, a computer) which executes programs like a physical machine.",,
+Virtual Private Network (VPN),Noun,"A virtual private network is a method for 
connecting your computer securely to the network of an organization on the 
other side of the Internet. When you use a VPN, all of your computer's Internet 
communications is packaged together, encrypted and then relayed to this other 
organization, where it is decrypted, unpacked, and then sent on to its 
destination. To the organization's network, or any other computer on the wider 
Internet, it looks like your computer's request is coming from inside the 
organization, not from your location. VPNs are used by businesses to provide 
secure access to internal resources (like file servers or printers). They are 
also used by individuals to bypass local censorship, or defeat local 
surveillance. (Synonyms: VPN) (Source: EFF)",,
+"Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a 
method for connecting your computer securely to the network of an organization 
on the other side of the Internet. When you use a VPN, all of your computer's 
Internet communications is packaged together, encrypted and then relayed to 
this other organization, where it is decrypted, unpacked, and then sent on to 
its destination. To the organization's network, or any other computer on the 
wider Internet, it looks like your computer's request is coming from inside the 
organization, not from your location. VPNs are used by businesses to provide 
secure access to internal resources (like file servers or printers). They are 
also used by individuals to bypass local censorship, or defeat local 
surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",,
+Virtual Private Server (VPS),Noun,Virtual Private Server,,
+VoIP Call,Noun,,,
+Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet 
for voice communication with other VoIP users or receive telephone calls over 
the Internet.
+Synonyms: VoIP.
+Source EFF.",الصوت عبر ميثاق الإنترنت,أي 
تكنولوجيا تسمح لك باستخدام الإنترنت 
للتواصل الصوتي مع مستخدمي VoIP الآخرين أو 
تلقي الاتصالات الهاتفية عبر الإنترنت.
+WAN,Noun,,,
+Warning!,Interjection,ex: “Warning! Selecting 'OK' will permanently delete 
all files”,,
+WebApp,Noun,,,
+Welcome,Noun,,,
+WhisperBack,Noun,,,
+WiFi,Noun,,,
+Windows,Noun,Operating system,,
+Work,Verb,,,
+World Wide Web,Noun,,,
+XMPP,Noun,"Copy of data, updated regularly or not, in order to allow 
restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an 
optical disk or USB drive. This last option allows backups to be stored away 
safely. [Signal]",XMPP,معيار مفتوح للتراسل المباشر - 
كان يستخدمه كل من Google وفيسبوك ولكنهما 
توقفا. وهناك خدمات للتراسل المباشر الم
ستقلة والتي عادة ما تستخدم XMPP. والخدمات مثل 
Whatsapp لها بروتوكولاتها الخاصة والتي تكون م
غلقة وسرية.
+XSS,Noun,,,
+XXL,Noun,Extra extra large. Clothing size.,,
+YYYY,Noun,“Year” Indicates that user must input a 4-digit year (ex: 1990),,
+Zip,Noun,Abbreviation of 'Zip Code' or 'Postal Code',,
+about,Preposition,"[Globaleaks] As in, the “About” section of a website or 
application.",بشأن,
+academic,,,,
+accept,Verb,[Signal],قبول,
+access,Noun,,الوصول,
+access,Verb,,وصول,
+access mode,Noun,,وضع الوصول,
+access token,Noun,"[Martus]
+Short identification number used to add Contacts to your Martus 
account.",شارة الوصول,
+accessibility,Noun,,,
+account,Noun,,الحساب,
+account recovery,Noun,,استعادة الحساب,
+account recovery code,Noun,,رمز استعادة الحساب,
+accountability,Noun,,المسائلة,
+accounting,,,,
+acknowledge,Verb,"An acknowledgment in Peerio is similar to a message, but 
sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is 
referred to as an ""acknowledgment""",مفهوم,
+acknowledged,Adjective,"An acknowledgment in Peerio is similar to a message, 
but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is 
referred to as an ""acknowledgment""",فاهم,
+acknowledgment,Noun,"American English — A button in Peerio that functions 
similar to a message, but sends a ""thumbs up"" icon with a timestamp. The 
thumbs-up icon is referred to as an ""acknowledgment""",,
+acquire,Verb,,يكتسب,
+activate,Verb,[Orbot],,
+active,Adjective,,نشيط,
+activists,,,,
+activity,,,,
+activity,Noun,,النشاط,
+ad provider,Noun,[Psiphon 3],,
+ad-blocker,Noun,,حاجب إعلانات,
+add,Verb,,إضافة,
+add-on,Noun,"A piece of software that modifies another software application, 
changing how it works or what it can do. Often add-ons can add privacy or 
security features to web browsers or email software. Some add-ons are malware, 
so be careful to install only those that are reputable and from official 
sources. (Synonyms: extensions, plugins) (Source: EFF)",الإضافة,
+add-ons,Noun,,,
+added,Adjective,,,
+address,Noun,,عنوان,
+address,Verb,"(1) To address a situation
+Synonyms:  to fix, to take care of
+
+(2) Give to data or a data set an address in memory
+
+(3) If a letter, envelope, or parcel is addressed to you, your name and 
address have been written on it.",,
+address bar,Noun,,شريط العنوان,
+address book,Noun,,دليل العناوين,
+admin,Noun,,,
+administrative,,,,
+administrators,Noun,,,
+advance,,,,
+advanced,Adjective,,متقدم,
+advanced,Noun,it is a noun?,المتقدمة,
+advanced search,Noun,[Martus],البحث المتقدم,
+advanced user,Noun,,,
+adversary,Noun,"Your adversary is the person or organization attempting to 
undermine your security goals. Adversaries can be different, depending on the 
situation. For instance, you may worry about criminals spying on the network at 
a cafe, or your classmates at a school. Often the adversary is hypothetical.
+Source EFF.",,
+agenda notes,Noun,,,
+agent,Noun,,الوكيل,
+air gap,Noun,"A computer or network that is physically isolated from all other 
networks, including the Internet, is said to be air-gapped.
+Source EFF.
+
+An air gap, air wall or air gapping is a network security measure employed on 
one or more computers to ensure that a secure computer network is physically 
isolated from unsecured networks, such as the public Internet or an unsecured 
local area network. The name arises from the technique of creating a network 
that is physically separated from all other networks.
+Source Wikipedia",فجوة هواء,
+air-gapped (air gapped),Adjective,,,
+airline miles,,,,
+airlines miles,,,,
+alpha,Noun,,غير مستقر,
+alternate,Adjective,,,
+alternate,Noun,,,
+alternative,Adjective,,البديل,
+alternative,Noun,,البديل,
+ambiguous,Adjective,,غامض,
+and/or,Conjunction,,و/أو,
+anomaly,Noun,[Globaleaks],,
+anonymity,,,,
+anonymity,Noun,[Orbot],التخفي,
+anonymization,Noun,"""It is the process of either encrypting or removing 
personally identifiable information from data sets, so that the people whom the 
data describe remain anonymous."" (Source: 
https://en.wikipedia.org/wiki/Data_anonymization)",إخفاء الهوية,
+anonymize,Verb,"[Orbot] To encrypt or remove personally identifiable 
information from data sets, so that the people whom the data describe remain 
anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization) 
[Signal]",إخفاء الهوية,
+anonymizing,,,,
+anonymous,,,,
+anonymous,Adjective,[Orbot],مجهول,
+anonymously,,,,
+anti-censorship,,,,
+antivirus,Noun,"Software that attempts to protect a device from being taken 
over by malicious software (or “malware""). Viruses were some of the first 
and most prevalent forms of malware; they were named viruses to reflect the way 
they would spread from device to device. These days most antivirus software 
concentrate on warning you if you look to be downloading a suspicious file from 
an external source, and examining files on your computer to see if they match 
the software's idea of what malware looks like.
+Anti-virus software can only recognize malware if it is substantially similar 
to samples that the anti-virus developer has already analyzed. This makes it 
far less effective at combating targeted malware designed to infiltrate a 
particular community or person, rather than more widespread strains of malware. 
Some advanced malware can also actively attack or conceal itself from antivirus 
software.
+Source EFF.",مضاد فيروسات,
+anyone,,,,
+app,Noun,"[Orbot] Abbreviation of ""application."" (Synonyms: 
application)",تطبيق,
+app switcher,Noun,[Signal] Specific to iOS,,
+application,Noun,"[Orbot] An application program (app or application for 
short) is a computer program designed to perform a group of coordinated 
functions, tasks, or activities for the benefit of the user. (Source: 
https://en.wikipedia.org/wiki/Application_software) [Signal]",تطبيق,
+apply,Verb,,تطبيق,
+appreciates,,,,
+approach,Noun,,منهجية,
+approve,Verb,,يوافق,
+archive,Noun,"An archive file is a file that is composed of one or more 
computer files along with metadata. Archive files are used to collect multiple 
data files together into a single file for easier portability and storage, or 
simply to compress files to use less storage space.
+https://en.wikipedia.org/wiki/Archive_file",الأرشيف,"the noun Archive 
in English is translated to the Arabic word ""آرشيف"" while the verb 
Archive translates to the Arabic verb ""أرشفة"""
+archive,Verb,[Signal],أرشفة,
+argument,Noun,,,
+arrive,Verb,,يصل,
+article,Noun,,مقال,
+as root,Noun,,,
+asset,Noun,"In threat modeling, any piece of data or a device that needs to be 
protected.
+Source EFF.",أصول,في نمذجة الخطر، هي أي بيانات أو 
أجهزة يتوجب حمايتها.
+asymmetric-key encryption,Noun,"Traditional encryption systems use the same 
secret, or key, to encrypt and decrypt a message. So if I encrypted a file with 
the password ""bluetonicmonster"", you would need both the file and the secret 
""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to 
encrypt, and another to decrypt. This has all kinds of useful consequences. For 
one, it means that you can hand out the key to encrypt messages to you, and as 
long as you keep the other key secret, anyone with that key can talk to you 
securely. The key you hand out widely is known as the ""public key"": hence the 
name of the technique. Public key encryption is used to encrypt email and files 
by Pretty Good Privacy (PGP), OTR for  messaging, and SSL/TLS for web browsing.
+Synonyms: Public key encryption, Public key cryptography. (Source EFF)",,
+at the Heart of Internet Freedom,,,,
+attach,Verb,To attach a file to a message,إرفاق,
+attachment,Noun,[Signal] File sent together with an email or other electronic 
message.,ملف مرفق,
+attack,Noun,"In computer security, an attack is a method that can be used to 
compromise security, or its actual use. An attacker is the person or 
organization using an attack. An attack method is sometimes called an 
""exploit.""
+Source EFF.",,
+attacker,Noun,,مهاجم,
+audio,Adjective,[Signal],,
+audio,Noun,,صوت,
+auth token,Noun,[Orbot],,
+authenticate,Verb,,وثّق,
+authenticated,Adjective,,مُوثّق,
+authentication,Noun,[Signal],,
+authentication ,Noun,[Signal],التوثيق,
+author,Noun,,المؤلف,
+authorize,Verb,,إسمح,
+automated traffic,Noun,,,
+autonomous system number,Noun,,,
+availability,,,,
+availability,Noun,,,
+available,Adjective,,متوفر,
+avatar,Noun,"A computer generated visual icon used as an alternative digital 
fingerprint. aka ""identicon"". [Signal]",الصورة الرمزية,
+back,,,,
+back,Noun,As in “Back” button,رجوع,
+back,Verb,,,
+back up,Verb,,نسخ احتياطي,
+background,Noun,Screen surface where text and graphic elements are 
displayed,الخلفية,
+backlog,Noun,Delayed processing of some sort,,
+backup,Noun,"[Signal] [Orbot] Copy of data, updated regularly or not, in order 
to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an 
optical disk or USB drive. This last option allows backups to be stored away 
safely.",نسخة الاحتياط,
+badge,Noun,[Signal],,
+balance,Noun,What is left to be paid or recovered.,,
+bandwidth,Noun,[Orbot],سعة النقل,
+bank fees,,,,
+bar,Noun,,شريط,
+bar chart,Noun,,مخطط بأعمدة,
+bare-metal,Adjective,,,
+base,,,,
+batch select,Noun,[Signal],,
+battery,Noun,,,
+be careful,,,,
+best-effort delivery,Noun,,,
+beta,Noun,,شبه مستقر,
+big data,Noun,,البيانات الكبيرة,
+billing,,,,
+binaries,Noun,,ثنائيّات,
+binary,Noun,"Binary file.
+8-bit encoded data file using only 0 and 1, different from ASCII which is 
7-bit encoded.",ثنائيّ,
+block,,,,
+block,Noun,,كتلة,
+block,Verb,[Signal],حجب,
+blocked,Adjective,,محجوب,
+blocked access,Noun,,وصول محجوب,
+blockfile,Noun,[I2P] http://www.i2p2.de/blockfile.html,,
+blocking,Noun,"Synonyms: filtering, censoring Internet traffic.",,
+blocking resistant,Adjective,,مقاوم للحجب,
+blog,Noun,,المدونة,
+blog post,Noun,"Short text posted to a blog, the content of which is left 
entirely to the discretion of the author.",,
+blogging,Noun,Posting to a blog and updating it regularly.,,
+body,Noun,,جسم,
+bookmark,Noun,,علامة مرجعية,
+boolean,Adjective,,القيم المنطقية,
+boolean,Noun,,القيم المنطقية,
+boot,Noun,[Orbot],,
+boot,Verb,[Orbot],تمهيد,
+bootable,Adjective,,قابل للتمهيد,
+bootloader,Noun,,محمل التمهيد,
+bot,Noun,,,
+botnet,Noun,,,
+bounce,Verb,,,
+bouncing,,,,
+bounty,Noun,,جائزة,
+box,Noun,,صندوق,
+break in,Noun,,يقتحم,
+bridge,Noun,[Orbot] [Tor],جِسْر,
+bridge,Verb,[Tor],تجسير,
+bridge line,Noun,[Tor] a line with the bridge configuration,خط الجسر,
+bridge relay,Noun,[Tor],,
+bridge type,Noun,[Tor],نوع الجِسْر,
+bridges,Noun,,,
+broad range,,,,
+broadcast,Verb,[Signal],,
+browse,Verb,[Orbot],تصفح,
+browser,,,,
+browser,Noun,web browser,متصفح,
+browser fingerprint,Noun,"The various properties of your web browser or 
computer that a web site can notice when you visit. They may be slightly 
different from other browsers or computers, which can be a way to recognize you 
even if you didn't log in, even if your computer doesn't save cookies, and even 
if you connect to the Internet from a different network in the future. For 
example, you might be the only person who uses a particular site from a device 
set to a particular language, with a particular screen size, and using a 
particular web browser version; then the site could realize that it's you 
whenever you visit, even if you don't do anything to reveal your identity.
+Source EFF.",,
+browsing,,,,
+buffer,Noun,,,
+bug,Noun,,خطأ,
+bug report,Noun,[Signal],الإبلاغ عن الخطأ,
+bundle,Noun,,,
+bundled,Adjective,,,
+burden,,,,
+burden,Noun,,,
+burner phone,Noun,"A phone that is not connected to your identity, is only 
used for a small set of calls or activities, and can be discarded if and when 
it is suspected of being tracked or compromised. Burner phones are often 
pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
+(Source: EFF)",,
+button,Noun,,زر,
+by,Adverb,,,
+bypass,Verb,,تخطي,
+bytes,Noun,[Globaleaks],,
+cache,Noun,,مخبأ,
+cache,Verb,,خبأ,
+cache-busting,Noun,,,
+calendar,Noun,,التقويم,
+camera,Noun,,,
+cams,,,,
+cams,Noun,,,
+can,Verb,,,
+cancel,Verb,[Signal],إلغاء,
+cannot,Verb,,,
+capability,Noun,"The capability of an attacker (in the context of an attack) 
is what it is able to do to achieve its aims. For example, a country's security 
services might have the capability to listen to telephone calls while a 
neighbor may have the capability to watch you from their window. To say that an 
attacker “has"" a capability does not mean that they will necessarily use 
that capability. It does mean that you should consider and prepare for the 
possibility.
+Source EFF.",,
+car documents,Noun,[Umbrella],,
+card number,Noun,,,
+carjacking,Noun,,,
+carry,,,,
+carry,Verb,,,
+case management,Noun,[GlobaLeaks],,
+cash,,,,
+cash,Noun,,,
+cc,Noun,“carbon copy”,,
+censor,,,,
+censor,Noun,,,
+censored,,,,
+censored,Adjective,,,
+censorship,,,,
+censorship,Noun,[Signal],,
+cerificate,,,,
+certificate,Noun,,شهادة,
+certificate,Verb,To give a certificate,يعطي شهادة,
+certificate authority,Noun,,,
+certificate chain,Noun,[Globaleaks],سلسلة التصديق,
+certificate chain file,Noun,[Globaleaks],,
+certificates,Noun,"Is it needed, the plural form defined here? The singular 
already exists.",الشهادات,
+chain,Noun,,سلسلة,
+change,Verb,,,
+change log,Noun,,سجل التغيير,
+charges,,,,
+charges,Noun,,,
+chart,Noun,,مخطط,
+chat,Noun,[Signal],دردشة,
+chat,Verb,[Signal],,
+check,Verb,,تحقق,
+checking,,,,
+checkpoint,Noun,,,
+checksum,Noun,,,
+choke,Verb,,,
+chokepoint,Noun,,,
+choker,Noun,,,
+choose,Verb,,,
+choose ,Verb,,إختر,
+chronic stress,Noun,,,
+cipher,Noun,,,
+ciphertext,Noun,,نص مُعمَّى,
+circuit,Noun,[Orbot],,
+circuits,,,,
+circuits,Noun,,,
+circumvent,Verb,[Orbot],يتحايل,
+circumvention,Noun,[Signal] [Orbot],تحايل,
+clear,Verb,[Signal] [Orbot],نظف,
+cleartext,Noun,,نص صِرف,
+click,Noun,,النقر,
+click,Verb,[Signal],إنقر,
+click and hold,Verb,,إنقر مع الإستمرار,
+clickjacking attack,Noun,,هجوم عبر تغيير وجهة النقر,
+client,Noun,"[Signal] [Orbot] As in ""desktop client"" or ""Android 
client.""",عميل,
+clipboard,Noun,[Signal],الحافظة,
+clock skew,Noun,,,
+close,Verb,,أغلق,
+cloud,,,,
+cloud server,Noun,[Orbot],,
+cloud storage,Noun,,سحابة التخزين,
+coarse data,Noun,Unprocessed data,,
+code,Noun,,رمز,
+codec,Noun,,مرمز,
+collected,,,,
+collection,,,,
+collection,Noun,,,
+collusion,Noun,,مؤامرة,
+collusion attack,Noun,,,
+color,Noun,,اللون,
+column,Noun,,العمود,
+command,Noun,,الأمر,
+command and control server,Noun,"A command and control server (C&C or C2) is a 
computer that gives orders to malware-infected devices and receives information 
from those devices. Some C&C servers control millions of devices.
+Synonyms: C&C, C2.
+Source EFF.",,
+command line,Noun,,سطر الأوامر,
+comment,Noun,[Globaleaks],,
+commercial VPN,Noun,"A commercial Virtual Private Network is a private service 
that offers to securely relay your Internet communications via their own 
network. The advantage of this is that all of the data you send and receive is 
hidden from local networks, so it is safer from nearby criminals, or untrusted 
local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is 
useful both for protecting communications from a local government, and 
bypassing national censorship. The down side is that most of the traffic is 
decrypted at the commercial VPN's end. That means you need to trust the 
commercial VPN (and the country where it is located) not to snoop on your 
traffic.
+Source EFF.",,
+communicate,Verb,,تواصل,
+communication,,,,
+communication,Noun,,تواصل,
+community,,,,
+community,Noun,,المجتمع,
+community center,Noun,,مركز المجتمع,
+companies,,,,
+compartmentalization,Noun,,تقسيم,
+compartmentalize,Verb,,تجزئة,
+compatible,Adjective,,متوافق,
+complete,Verb,,إكمل,
+completed,Adjective,,مُكتمل,
+compose,Verb,[Signal],,
+compressed,Adjective,,مضغوط,
+compression,Noun,,ضغط,
+compression/decompression tool,Noun,,اداة ضغط/إلغاء الضغط,
+compromise,Verb,,ينتهك,
+compromised,Noun,[Globaleaks],,
+computer,Noun,[Signal],حاسوب,
+concern,,,,
+concordance,Noun,,انسجام,
+conference,Noun,,مؤتمر,
+conferences,,,,
+confidentiality,Adjective,[Globaleaks] [Orbot],,
+configuration,Noun,[Globaleaks] [Orbot],تهيئة,
+configure,Verb,[Signal] [Orbot],اضبط,
+confirm,Verb,,,
+connect,Verb,[Signal],,
+connecting,Verb,,,
+connection,,,,
+connection,Noun,[Orbot],الاتصال,
+consensus,Noun,,إجماع,
+constraint,Noun,,قيود,
+contact,Noun,[Signal] [Martus] Another Martus user with whom you can share 
your Martus bulletins.,جهة اتصال,
+contact info,Noun,,,
+contact information,Noun,,,
+contact request,Noun,,طلب التواصل,
+content,Noun,,المحتوى,
+context,Noun,"[Globaleaks] Tips are classifies in contexts, e.g. corruption",,
+control panel,Noun,,لوحة التحكم,
+control port,Noun,,منفذ التحكم,
+conventional,Adjective,,تقليدي,
+conversation,Noun,"A ""conversation"" is the same as a message ""thread"" 
[Signal]",محادثة,
+cookie,Noun,"[Orbot] Cookies are a web technology that let websites recognize 
your browser. Cookies were originally designed to allow sites to offer online 
shopping carts, save preferences or keep you logged on to a site. They also 
enable tracking and profiling so sites can recognize you and learn more about 
where you go, which devices you use, and what you are interested in – even if 
you don't have an account with that site, or aren't logged in. (Source : EFF)",,
+cookies,Noun,,,
+copy,Verb,,نسخ,
+corporate foundation,,,,
+corporate intranet,Noun,"Companies and other large institutions will usually 
have some services (email, web, and access to files and printers for instance) 
that are accessible from within their own local network, but not from outside 
on the wider Internet. Most companies take this as being sufficient security to 
protect their internal documents, but this means that any attack that can 
connect to the intranet can access or interfere with all the information being 
kept locally. An example of such an attack is tricking an employee to install 
malware on their laptop. To allow employees to access the intranet via the 
wider Internet, companies will often provide their own Virtual Private Network 
(VPN) which creates a secure connection to the inside of the intranet from 
anywhere in the world.
+Source EFF.",إنترانت شركة,"تملك الشركات وغيرها م
ن المؤسسات الضخمة عادة بعض الخدمات (إيميل، 
شبكة، ووصول إلى الملفات والطابعات مثلاً) يم
كن الوصول إليها من شبكتها المحلية، ولكن ليس 
من الخارج على الإنترنت بشكل عام. تكتفي أغلب 
الشركات بذلك لحماية أمن مستنداتها 
الداخلية، ولكن هذا يعني أن أي هجوم يمكنه 
الاتصال بشبكة إنترانت الداخلية يمكنه 
الوصول أو العبث بجميع المعلومات المحفوظة م
حلياً. مثلاً: خداع أحد الموظفين لتثبيت برم
جيات خبيثة على جهازه. للسماح لجميع الموظفين 
بالوصول إلى الشبكة الداخلية ""إنترانت"" من 
الإنترنت، غالباً ما تقدم الشركات شبكة 
افتراضية Ø
 ®Ø§ØµØ© تنشئ اتصالاً آمناً بالشبكة الداخلية م
ن أي مكان في العالم."
+country,,,,
+crack,,,,
+crash,Noun,,,
+crash report,Noun,,,
+create,Verb,,,
+credentials,Noun,,الإعتمادات,
+credit card,,,,
+credits,Noun,,ائتمانات,
+critical,,,,
+cropping,Noun,,,
+cross-certification,Noun,,,
+crucial,Adjective,,حاسمة,
+cryptocurrency,Noun,,عملة معماة,
+cryptographers,,,,
+cryptographic signature,Noun,"The use of a mathematical technique to confirm 
the origin of information, and to confirm that it wasn't changed since it was 
written. Digital signatures may be used with software downloads to make sure 
that the software you're installing is the same as the official published 
version, and that nobody has tampered with it. They're also often used on 
encrypted email and for many other purposes. When information isn't protected 
by a digital signature, an Internet service provider or other communications 
provider could change the contents of what someone wrote or published, and 
there wouldn't be a technical means to detect that this happened.
+Synonyms: digital Signature
+Source EFF.",,
+cryptography,Noun,"The art of designing secret codes or ciphers that let you 
send and receive messages to a recipient without others being able to 
understand the message.
+Source EFF.",,
+cryptoparty,Noun,"When you're using public key encryption, it's important to 
be sure that the key you use to encrypt a message really belongs to the 
recipient (see key verification). PGP makes this a little easier by having a 
way to tell others ""I believe this key belongs to this person -- and if you 
trust me, you should believe that too."" Telling the world that you trust 
someone's key is called ""signing their key"": it means anyone who uses that 
key can see you vouched for it. To encourage everyone to check and sign each 
others keys, PGP users organize key-signing parties. They're almost, but not 
quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to 
other friends.
+Synonyms: key-signing party.
+Source EFF.",,
+"crítico, críticos, de segurança pessoal da informação",,,,
+current,Adjective,,,
+currently,,,,
+curriculum for trainers,Noun,,,
+custidoan,Noun,,,
+custodian,Noun,[Globaleaks],,
+custom,Adjective,,مخصص,
+customer support,Noun,,خدمة العملاء,
+customization,Noun,[Globaleaks],التخصيص,
+customize,Verb,,خصَّص,
+cut,Verb,,قص,
+daemon,Noun,,العفريت,
+dashboard,Noun,,لوحة التحكم,
+data,Noun,[Signal] [Orbot],بيانات,
+data package,Noun,,حزمة بيانات,
+data retention,Noun,,,
+data storage,Noun,,,
+data-Driven Dropdown (Field),Noun,[Martus],,
+database,Noun,[Signal],,
+datastore,Noun,http://en.wikipedia.org/wiki/Datastore_network,مخزن 
البيانات,
+date range,Noun,,,
+day,Noun,,اليوم,
+deactivate,Verb,[Orbot],,
+debit,,,,
+debriefing,Noun,,,
+debug,Verb,,يصحح,
+debug log,Noun,[Signal],,
+debug mode,Noun,,وضع التصحيح,
+debugging,Noun,,,
+deck,Noun,[Ooniprobe] This is a collection of ooniprobe tests and inputs.,,
+decline,Verb,"[Signal] To reject. As in ""Decline an incoming call.""",,
+declined,Verb,,,
+decompression,Noun,,إلغاء الضغط,
+decorating,,,,
+decrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption 
of data. [Signal],فك التعمية,
+decrypted,Adjective,[Signal],فُكَّت تعميته,
+decryption,Noun,[Orbot],فك التعمية,
+dedicated server,Noun,[Globaleaks],خادم مخصص,
+deductible,,,,
+deepending,Adjective,,,
+default,Adjective,[Globaleaks] [Signal] [Orbot],الافتراضي,
+default,Noun,[Orbot],الافتراضي,
+default server,Noun,,خادم افتراضي,
+defenders,,,,
+delay,Noun,,التأخير,
+delete,Verb,[Globaleaks] [Signal],حذف,
+deleted,Adjective,,حُذف,
+deletion,Noun,[Globaleaks],,
+deprecated,Adjective,,,
+descriptor,Noun,"Identification item for a file, a program or a data.",,
+deselect,Verb,,,
+desktop,Noun,[Signal],سطح المكتب,
+destroy,Verb,Removes message/file from the entire Peerio server and all users' 
accounts,أتلف,
+detail,Noun,[Signal],التفاصيل,
+detection,Noun,,,
+deter,,,,
+device,Noun,[Signal] [Orbot],جهاز,
+dialog,Noun,,نافذة,
+diceware,Noun,,,
+digital,Adjective,,رقمي,
+digital,Noun,,,
+digital certificate,Noun,"A way to confirm automatically that a public key is 
correct (is really the one that's used by a particular entity), in order to 
prevent man-in-the-middle attacks. Most often used by web sites to prove to 
your browser that you have a secure connection to the real site, and not to 
some other system that's tampering with your connection.
+Synonyms: Security certificate.
+Source EFF.",,
+digital signature,Noun,"The use of a mathematical technique to confirm the 
origin of information, and to confirm that it wasn't changed since it was 
written. Digital signatures may be used with software downloads to make sure 
that the software you're installing is the same as the official published 
version, and that nobody has tampered with it. They're also often used on 
encrypted email and for many other purposes. When information isn't protected 
by a digital signature, an Internet service provider or other communications 
provider could change the contents of what someone wrote or published, and 
there wouldn't be a technical means to detect that this happened.
+Synonyms: cryptographic signature.
+Source EFF.",,
+diplomats,,,,
+directory,Noun,[Signal],دليل/مجلد,
+directory authorities,Noun,,,
+disable,Verb,[Signal] [Orbot],تعطيل,
+disabled,,,,
+disabled,Adjective,,مُعطل,
+disabled,Verb,,مُتعطل,
+disappearing message,Noun,[Signal],,
+discard,Verb,[Signal],تجاهل,
+disclaimer,Noun,,,
+disconnect,Verb,[Signal],,
+discouraged,,,,
+discussion,Noun,,نقاش,
+disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of 
removable storage device (USB, CD, floppy disk etc.)",قرص,
+diversify,,,,
+document,Noun,[Signal],,
+domain,Noun,An area or set of activities in one's digital life that has 
certain security requirements and therefore involves the use of certain qube.,,
+domain name,Noun,"The address, in words, of a website or Internet service; for 
example: ssd.eff.org. (Source: EFF)",اسم نطاق,العنوان، م
كتوباً باستخدام أحرف، لموقع ما أو خدمة 
إنترنت معينة. مثلاً: ssd.eff.org
+domestic violence survivors,,,,
+domestic violence survivors,Noun,,,
+donating,,,,
+donating,Verb,,,
+donation,,,,
+donation,Noun,,,
+donation process,Noun,,,
+donations,,,,
+donations,Noun,"feminine noun, otherwise a (V) verb. 
+eu doo
+tu doas
+ele doa
+nós doamos
+vós doais
+eles doam",,
+donations options,,,,
+donor,Noun,,,
+download,,,,
+download,Noun,[Globaleaks],التنزيل,
+download,Verb,[Globaleaks],تنزيل، تحميل,
+draft,Noun,,,
+drag,Verb,,سحب,
+drop-down list,Noun,,,
+dual boot,Noun,,,
+ePub Reader,Noun,,,
+eQualitie,Noun,Do not translate,,
+eavesdropper,Noun,,,
+eavesdroppers,,,,
+edit,Verb,,تعديل,
+eepsite,Noun,,,
+eligibility criteria,Noun,,,
+email,,,,
+email,Noun,,,
+email address,,,,
+email address,Noun,,عنوان البريد الإلكتروني,
+email identity (e-mail identity),Noun,Synonym: e-mail identity,,
+email provider,Noun,,مزود البريد الاليكتروني,
+"email, e-mail",Noun,Synonym: e-mail,البريد الإلكتروني,
+emailing,,,,
+embedded,Adjective,,مُدمَج,
+emoji,Noun,[Signal],,
+enable,Verb,[Signal] [Globaleaks] [Orbot],تفعيل,
+enabling,,,,
+encoded,Adjective,,مرموز,
+encrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption 
of data. [Signal],تشفير,"""عملية تأخذ الرسائل 
وتجعلها غير مقروءة سوى من قبل الشخص الذي 
يعرف كيفية فك تشفيرها ليجعلها قابلة 
للقراءة مجدداً."" (EFF)"
+encrypted,Adjective,[Globaleaks],مُشفر,
+encrypted communication,Noun,,,
+encrypted message,Noun,,,
+encrypted persistent storage,Noun,[Tails],,
+encryption,Noun,"[Globaleaks] [Orbot] A process that takes a message and makes 
it unreadable except to a person who knows how to ""decrypt"" it back into a 
readable form. (Source: EFF)",التشفير,"""عملية تأخذ 
الرسائل وتجعلها غير مقروءة سوى من قبل الشخص 
الذي يعرف كيفية فك تشفيرها ليجعلها قابلة 
للقراءة مجدداً."" (EFF)"
+encryption key,Noun,"[Globaleaks] An encryption key is a piece of information 
that is used to convert a message into an unreadable form. In some cases, you 
need the same encryption key to decode the message. In others, the encryption 
key and decryption key are different. (Source: EFF)",مفاتيح 
التشفير,
+end-to-end,Conjunction,,من طرف إلى طرف,
+end-to-end encryption,Noun,"End-to-end encryption ensures that a message is 
turned into a secret message by its original sender, and decoded only by its 
final recipient. Other forms of encryption may depend on encryption performed 
by third-parties. That means that those parties have to be trusted with the 
original text. End-to-end encryption is generally regarded as safer, because it 
reduces the number of parties who might be able to interfere or break the 
encryption. (Source: EFF) [Signal]",التشفير من طرف إلى 
طرف,تضمن الشيفرة المتبادلة بين طرفين تحويل 
رسالة إلى رسالة سرية من قبل مرسلها الأصلي، 
وفك تشفيرها فقط من قبل المستقبل النهائي الم
قصود. قد تعتمد أشكال التشفير الأخرى على 
تشفير تجريه أطراف ثالثة. وذلك يعني أن تلك 
الأطراف يجب أن تكون موثوقة لتعاملها مع النص 
اÙ
 „أصلي. يعتبر التشفير المتبادل بين طرفين 
عادة أكثر أمناً حيث أنه يقلص عدد الأطراف 
القادرة على التدخل أو فك التشفير.
+end-user,Noun,,,
+engine,,,,
+ensure,,,,
+enter,Verb,,إدخل,
+entry guard,Noun,,,
+error,Adjective,,,
+error,Noun,[Signal],خطأ,
+event log,Noun,,سجل الحالات,
+exception,Noun,,,
+exchange,Verb,,تبادل,
+excited,,,,
+executable,Noun,,,
+exercised,,,,
+exit,Noun,,خروج,
+exit,Verb,,خروج,
+exit relay,,,,
+exit relay,Noun,,,
+exited,Verb,,خرج,
+experience,Verb,,,
+expiration,Noun,,,
+expiration date,Noun,,تاريخ انتهاء الصلاحية,
+expire,Verb,[Signal],,
+expired,Noun,,,
+expiry,Noun,[Globaleaks],,
+expiry,Verb,[Signal],,
+export,Noun,[Signal],,
+export,Verb,[Signal],تصدير,
+extend,Verb,[Globaleaks],,
+extension,Noun,"A piece of software that modifies another software 
application, changing how it works or what it can do. Often add-ons can add 
privacy or security features to web browsers or email software. Some add-ons 
are malware, so be careful to install only those that are reputable and from 
official sources. (Synonyms: Add-on, Plugin)(Source: EFF)",,
+extent,,,,
+external storage,Noun,,,
+extract,Verb,,,
+fail,Verb,[Signal],,
+failed,Adjective,,,
+faq,,,,
+fax,Noun,[Signal] As in “fax machine.”,,
+feature,Noun,[Signal],,
+feature set,Noun,,,
+feed,Noun,E.g. RSS feed,,
+feedback,,,,
+fees,,,,
+fetch,Verb,[Signal],,
+ficheiro,Noun,,,
+field,,,,
+field,Noun,[Globaleaks] A data entry field,خانة، حقل,
+figuring out,,,,
+file,Noun,A data entry field [Signal] [Globaleaks],ملف,
+file ,Noun,,,
+file attachment,,,,
+file attachment,Noun,[Globaleaks],,
+file container,Noun,,,
+file sharing,Noun,,,
+filed,,,,
+filesystem,Noun,,,
+filled out,,,,
+filter,Noun,,,
+financial,,,,
+financially,,,,
+find,Verb,,,
+fingerprint,Noun,"[Orbot] The keys of public key cryptography are very large 
numbers, sometimes a thousand or more digits long. A fingerprint is a much 
smaller number or set of numbers and letters that can be used as a unique name 
for that key, without having to list all of the key's digits. So, for instance, 
if you and a friend wished to make sure you both had the same key, you could 
either spend a long time reading off all the hundreds of digits in the key, or 
you could each calculate your key's fingerprint and compare those instead. The 
fingerprints presented by cryptographic software usually consist of around 40 
letters and numbers. If you carefully check that a fingerprint has the right 
value, you should be safe against impersonation using a fake key. Some software 
tools may offer more convenient alternative ways to verify a friend's key, but 
some form of verification needs to happen to prevent communications providers 
from easily being able to listen in.
+Source EFF.",,
+fingerprint identification,Noun,,,
+firewall,Noun,"[Orbot] A tool that protects a computer from unwanted 
connections to or from local networks and the Internet. A firewall might have 
rules that forbid outgoing email, or connections to certain websites. Firewalls 
can be used as a first line of defense to protect a device from unexpected 
interference. Or they can be used to prevent users from using the Internet in 
certain ways. (Source: EFF)",,
+fits,,,,
+fix,Noun,,,
+fix,Verb,,,
+flight vouchers,,,,
+floodfill,Noun,,,
+floodfill peer,Noun,,,
+folder,Noun,[Signal],,
+follow,Verb,,,
+for,Preposition,,,
+form,,,,
+forum,Noun,[Signal],,
+forward,,,,
+forward,Verb,"[Signal] As in, “to forward an email or a message.”",,
+foundations,,,,
+fragment,Noun,,,
+fraudulent ,,,,
+free,,,,
+free,Adjective,,,
+freedom,Noun,[Orbot],,
+freedoms,,,,
+frontdesk,,,,
+full restricted route,Noun,,,
+fund us,,,,
+funding,,,,
+furthering,,,,
+gateway,Noun,,,
+gender,Noun,,,
+general,Adjective,,,
+generate,Verb,"As in ""generate key"" [Signal]",توليد,
+generation,Noun,,,
+generation ,Noun,,,
+generator,Noun,,,
+generator ,Noun,,مولد,
+geo-location,Noun,,موقع جغرافي,
+geography-based blocking,,,,
+gift,,,,
+gift cards,,,,
+gift matching,,,,
+gist,Noun,"""In computing, Gist is a scientific graphics library written in C 
by David H. Munro of Lawrence Livermore National Laboratory. It supports three 
graphics output devices: X Window, PostScript, and Computer Graphics Metafiles 
(CGM). The library is promoted as being small (writing directly to Xlib), 
efficient, and full-featured. "" 
-https://en.wikipedia.org/wiki/Gist_(computing) [Signal]",,
+giving,,,,
+goal,Noun,,,
+grants,,,,
+guard,Noun,,,
+guard relay,Noun,[The Tor Project],,
+guidelines,Noun,,,
+handshake,Noun,Signal exchange process between pieces of equipment until they 
are synchronized. Transmitting and receiving communication can then take 
place.,,
+hardware,,,,
+header,Noun,,,
+help,Noun,,,
+help,Verb,,,
+helper link,Noun,,,
+helper link ,Noun,,,
+hidden service,Noun,[Tor],,
+hidden services,,,,
+hidden services,Noun,[Tor],,
+hidden volume,Noun,[VeraCrypt],,
+hide,Verb,,,
+high bandwidth,Noun,,,
+high capacity,Noun,,,
+high latency,Noun,,,
+high-quality,,,,
+hint,Noun,,,
+history,Noun,"As in ""Browser History""",,
+home,Noun,[Globaleaks],,
+home directory,Noun,,,
+hoodie,,,,
+hoodie,Noun,,,
+hoodies,,,,
+host,Noun,[Signal] [Globaleaks] [Orbot],,
+host,Verb,[Orbot],,
+hostname,Noun,,,
+hostnames,Noun,,,
+hour,Noun,,,
+however,,,,
+https://tb-manual.torproject.org/en-US/bridges.html,,,,
+human rights,,,,
+human rights,Noun,,حقوق الإنسان,
+human rights abuses,,,,
+i.e.,Noun,,,
+iCloud,Noun,[Signal],,
+iOS,Noun,,,
+iPhone,Noun,,,
+ice breakers,Noun,,,
+icon,Noun,[Signal] [Orbot],,
+identicon,Noun,"A computer generated visual icon used as an alternative 
digital fingerprint. aka ""identicon"".
+Synonym: avatar",,
+identity,Noun,[Orbot],,
+ignore,Verb,,,
+illegal,,,,
+illustrated,Adverb,,,
+illustrated ,Adverb,,,
+image,Noun,,,
+implement,,,,
+import,Noun,[Signal],,
+import,Verb,[Signal],استورد,
+improve,Verb,,,
+in touch,,,,
+in-transit encryption,Noun,,,
+inactivity timeout,Noun,,,
+inbox,Noun,,,
+include,Verb,,,
+incognito,Noun,[Signal],,
+income,,,,
+incoming,Adjective,[Signal],,
+incompatible,Adjective,,,
+incremental,Adjective,,,
+individuals,,,,
+info,Noun,,,
+information,Noun,,,
+informator,Noun,[Globaleaks],,
+input,Noun,,,
+input,Verb,[Globaleaks],,
+inquiries,,,,
+install,Verb,[Orbot],,
+installation,Noun,,,
+installer,Noun,,,
+institutions,,,,
+intended,,,,
+intercept,Verb,[Signal],,
+interface,Noun,,,
+internet,Noun,[Signal] [Orbot],,
+internet ,,,,
+"internet filtering, content filtering",Noun,[Orbot] Filtering is the politer 
term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source: 
EFF),,
+interrupt,Verb,,,
+intranet,Noun,,,
+invalid,Adjective,[Orbot],غير صالح,
+involved,,,,
+iptables,Noun,"[Orbot] ""iptables is a user-space utility program that allows 
a system administrator to configure the tables[2] provided by the Linux kernel 
firewall (implemented as different Netfilter modules) and the chains and rules 
it stores. Different kernel modules and programs are currently used for 
different protocols; iptables applies to IPv4, ip6tables to IPv6, arptables to 
ARP, and ebtables to Ethernet frames."" (Wikipedia)",,
+isim,,,,
+isolate,Verb,,,
+isolation,Noun,,,
+issue,Noun,[Signal],,
+jar,Noun,"“A JAR (Java ARchive) is a package file format typically used to 
aggregate many Java class files and associated metadata and resources (text, 
images, etc.) into one file for distribution.” 
(https://en.wikipedia.org/wiki/JAR_(file_format))",,
+jump service link,Noun,,,
+kernel,Noun,,,
+key,Noun,"In cryptography, a piece of data which gives you the capability to 
encrypt or decrypt a message. (Source EFF) [Globaleaks] [Signal]",,
+key ID,Noun,,,
+key code,Noun,[Globaleaks],,
+key list,Noun,,لائحة المفاتيح,
+key owner,Noun,,صاحب المفتاح,
+key pair,Noun,"To receive encrypted messages using public key cryptography 
(and to reliably inform others that a message genuinely came from you), you 
need to create two keys. One, the private key, you keep secret. The other, the 
public key, you can let anyone see. The two keys are connected mathematically, 
and are often collectively known as a ""key pair.""
+Source EFF.
+Synonym: keypair",مفتاحان,
+key password,Noun,,,
+key size,Noun,,طول المفتاح,
+keyboard,Noun,[Signal],,
+keychain,Noun,,,
+keypair (key pair),Noun,,,
+keyring,Noun,"If you use public key cryptography, you'll need to keep track of 
many keys: your secret, private key, your public key, and the public keys of 
everyone you communicate with. The collection of these keys is often referred 
to as your keyring.
+Source EFF.",مستودع المفاتيح,
+keyserver,Noun,,,
+keyword,Noun,,كلمات مفتاحية,Not sure
+kidnapping,Noun,,,
+kind,,,,
+kinds,,,,
+label,Noun,[Globaleaks],تسمية,
+language,Noun,[Globaleaks],,
+large,,,,
+launch,Noun,,,
+launch,Verb,[Signal],,
+law enforcement,Noun,"Sometimes used for ""law enforcement agencies"".",,
+law enforcement agency,Noun,,,
+learn,,,,
+legal,,,,
+legal costs,,,,
+legitimate,Adjective,,,
+library,Noun,"Refers to a ""library"" in computing",,
+license,Noun,,,
+license ,Noun,,,
+licensing,Noun,,,
+limited edition,,,,
+line-of-sight,Noun,,,
+link,Noun,,وصلة,
+link,Verb,[Signal],,
+linked device,Noun,[Signal] A mobile phone with a Signal account that is 
connected to a Signal Desktop account.,,
+little,,,,
+live,Adverb,,,
+load,Noun,[Globaleaks],,
+load,Verb,[Globaleaks] [Signal],,
+loading,Verb,[Globaleaks],,
+locale,Noun,"A collection of rules and data specific to a language and a 
geographic area. Locales include information on sorting rules, date and time 
formatting, numeric and monetary conventions, and character classification.",,
+locate,Noun,,,
+located,,,,
+location,Noun,,,
+lock,Verb,,,
+lock icon,Noun,,أيقونة القفل,
+log,Noun,[Signal] [Orbot],,
+log,Verb,[Globaleaks],,
+log data,Noun,,,
+log file,Noun,,,
+log in,Verb,,,
+logged in,Adjective,[Globaleaks],,
+logging,,,,
+logging,Noun,,,
+login,Noun,[Globaleaks],ولوج,
+logo,Noun,,علامة,
+logout,Noun,[Globaleaks],خروج,
+long,Adjective,[Globaleaks],,
+low latency,Noun,,,
+macOS,Noun,[Signal],,
+machine learning,Noun,,,
+mail,,"In Português when you say ""Mail"" we understand it as ""snail mail"" 
that in Português means, ""correio""",,
+mail,Noun,,,
+mailbox,Noun,,,
+mailing,,,,
+mailing address,,,,
+mailing list,Noun,,,
+main menu,Noun,,القائمة الرئيسية,
+maintain,Verb,,,
+manifest,Noun,,,
+manual,Adjective,,,
+master key,Noun,,مفتاح رئيسي,
+match,Verb,,,
+match ,Verb,,,
+matching,,,,
+"mbps, MB/s",Noun,[Orbot] megabytes per second,,
+mechanism,,,,
+media,Noun,[Signal],,
+media message,Noun,[Signal],,
+meek-azure,Adjective,,,
+member,,,,
+membership program,,,,
+menu,Noun,,قائمة,
+menu bar,Noun,[Signal],,
+message,Noun,[Signal],رسالة,
+message body,Noun,,,
+message thread,Noun,"Alternative to ""conversation""",,
+messaging,Noun,[Orbot],,
+meta search engine,,,,
+metadata,Noun,"Metadata (or ""data about data"") is everything about a piece 
of information, apart from the information itself. So the content of a message 
is not metadata, but who sent it, when, where from, and to whom, are all 
examples of metadata. Legal systems often protect content more than metadata: 
for instance, in the United States, law enforcement needs a warrant to listen 
to a person's telephone calls, but claims the right to obtain the list of who 
you have called far more easily. However, metadata can often reveal a great 
deal, and will often need to be protected as carefully as the data it 
describes. (Source EFF) [Signal]",بيانات وصفية,"""البيانات 
الوصفية (أو ""البيانات حول البيانات"") هي كل 
شيء حول قطعة من المعلومات ولا تتضمن المعلوم
ة نفسها. لذا محتوى الرسالة ليس بيانات 
وصفية، ولكن من أرسلها ومتى ومن أين ولمن 
كلها أمØ
 «Ù„Ø© على بيانات وصفية. غالباُ ما تحمي النظم 
التشريعية المحتوى أكثر من البيانات 
الوصفية: على سبيل المثال، في الولايات الم
تحدة تحتاج قوات تطبيق القانون لمذكرة 
للتنصت على مكالمات شخص ما، ولكن لها الحق في 
الحصول على قائمة بالأشخاص الذين اتصلت بهم 
بشكل أكثر سهولة. ولكن البيانات الوصفية 
غالباً ما تكشف الكثير، وستحتاج لحمايتها 
بنفس الحرص الذي تحمي به البيانات التي 
تصفها."" (EFF)"
+method,,,,
+microphone,Noun,[Signal],,
+middle relay,Noun,,,
+migrate,Verb,[Signal],,
+miniLock,Noun,,,
+minimize,Verb,Minimize a window,,
+ministreaming library,Noun,[I2P],,
+minute,Noun,,,
+mirror,Noun,,,
+miscellaneous,Adjective,,,
+missing,,,,
+mixed content,Noun,,,
+mobile,Adjective,,محمول,
+mobile data,Noun,,,
+mobile devices,,,,
+mobile notifications,Noun,,,
+mobile number,Noun,,,
+modal,Adjective,,مشروط,
+mode,Noun,[Globaleaks] [Orbot],,
+modes,,,,
+module,Noun,,,
+money order,,,,
+monitor,,,,
+month,Noun,,,
+mount,Verb,,,
+mouse,Noun,,,
+move,Verb,,,
+multi-boot,Noun,,,
+multimedia,Adjective,[Signal],,
+mute,Noun,[Signal],,
+mute,Verb,,,
+name,,,,
+name,Noun,,,
+nameserver,Noun,,,
+nearly,,,,
+neighborhood,Noun,,,
+network,,,,
+network,Noun,[Signal] [Orbot],,
+network admin,Noun,,,
+network administrator,Noun,,,
+network request,Noun,,,
+networking,Noun,,,
+new,Adjective,,,
+nickname,Noun,,,
+"nickname, nick",Noun,[Orbot],,
+node,Noun,[Orbot],,
+non-financial,,,,
+non-private,,,,
+non-profit organization,,,,
+nonprofits,,,,
+note,Noun,,,
+notification,Noun,[Globaleaks] [Signal],,
+notify,Verb,,,
+obfs3,Adjective,,,
+obfs4,Adjective,,,
+obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make 
it totally unintelligible to a human reader, even if helped by software 
tools.",,
+obfuscation,Noun,"Transformation of a section of code or program to make it 
totally unintelligible to a human reader, even if helped by software tools.",,
+obfuscation layer,Noun,"Related to data transmission
+[Tor]",,
+offline,Adjective,[Signal],,
+onboarding,Noun,,,
+once,,,,
+once,Adverb,,,
+onion service,Noun,[Tor],,
+online,,,,
+online,Adjective,[Signal],,
+open,Adjective,,,
+open,Verb,,,
+open source,Noun,[Orbot],,
+open-source,Adjective,[Orbot],,
+opened,Verb,,,
+operate,,,,
+operate,Verb,,,
+operator,Noun,,,
+opt,,,,
+optical,Adjective,,,
+optimization,Noun,[Orbot],,
+optimize,Verb,[Signal] [Orbot],,
+option,Noun,,,
+optional,Adjective,,,
+options,,,,
+or via,,,,
+order,Verb,[Globaleaks],,
+organizations,,,,
+organize,Verb,,,
+other,Adjective,,,
+outer volume,Noun,,,
+outgoing,Adjective,[Signal],,
+output,Noun,,,
+overlay,Noun,,تأطير,
+overview,,,,
+overview page,,,,
+owner,Noun,,,
+ownership,Noun,,,
+pack,,,,
+package,Noun,,,
+package manager,Noun,,,
+padding,Noun,[Orbot],,
+pager,Noun,[Signal],,
+paid,,,,
+pair,Verb,"To link devices, using bluetooth for example. [Signal]",,
+paper,Noun,,,
+paperwork,,,,
+paravirtualization,Noun,"""Paravirtualization"" An efficient and lightweight 
virtualization technique originally introduced by the Xen Project and later 
adopted by other virtualization platforms.",,
+parent,Adjective,,,
+parse,Verb,,,
+part,Noun,,,
+partial,Adjective,,,
+partially,Adverb,,,
+partition,Noun,"""Disk partitioning or disk slicing[1] is the creation of one 
or more regions on a hard disk or other secondary storage, so that an operating 
system can manage information in each region separately."" 
-https://en.wikipedia.org/wiki/Disk_partitioning";,,
+passcode,Noun,A user-chosen and device-specific password. [Signal],,
+passphrase,Noun,A computer-generated set of 6-10 random words used as the 
primary authentication for Peerio accounts. [Signal],,
+password,Noun,"A secret meant to be memorized, and meant to limit access to 
something so that only someone who knows the password can gain access. It might 
limit access to an online account, a device, or something else. A long password 
based on multiple words may also be called a ""passphrase"" to remind us that 
it's not just one ""word."" A main password to unlock other passwords in a 
password manager or password safe application is often called a ""master 
password.”
+Source EFF.",كلمة السر,
+passwords,Noun,,,
+paste,Noun,,,
+paste,Verb,,,
+path,Noun,,,
+payload,Noun,,,
+payment,,,,
+peer,Noun,,,
+peer reviewed,Adjective,,,
+peer-to-peer,,,,
+peers,Noun,,,
+pending,Adjective,[Signal],,
+penetration test,Noun,,فحص الاختراق,
+perceived performance,Noun,,,
+performance,Noun,,,
+permission,Noun,[Signal] [Orbot],,
+persistence,Adjective,,,
+persistence,Noun,,,
+persistence partition,Noun,,,
+persistent,Adjective,,,
+persistent overlay,Noun,,,
+persistent storage,Noun,[Tails],,
+persistent volume,Noun,,,
+phishing,Noun,,,
+physical surveillance,Noun,,,
+pin,Verb,"Pin a tab, a site in a browser.",,
+ping,Noun,[Globaleaks],,
+please,Adverb,,,
+please mail,,,,
+pluggable transports,Noun,,,
+plugin,Noun,"A piece of software that modifies another software application, 
changing how it works or what it can do. Often add-ons can add privacy or 
security features to web browsers or email software. Some add-ons are malware, 
so be careful to install only those that are reputable and from official 
sources. (Synonyms: add-on, extension)(Source: EFF)",,
+policies,Noun,,,
+policies,Verb,,,
+policy,Noun,,,
+policymakers,,,,
+popup,Noun,,نافذة منبثقة,
+popup window,Noun,,,
+port,Noun,[Signal] [Globaleaks] [Orbot],,
+portable,Adjective,,,
+postponed,Adjective,[Globaleaks],,
+predecessor attack,Noun,,,
+preenchido,,,,
+preference,Noun,[Globaleaks],,
+preferences,Noun,[Globaleaks] [Signal],تفضيلات,
+preferences page,Noun,[Globaleaks],,
+preferred,,,,
+prevent,,,,
+prevent,Verb,,اتقاء,
+prevents,,,,
+preview,Noun,[Globaleaks],,
+preview,Verb,[Signal],,
+privacy,,,,
+privacy,Noun,[Signal] [Orbot],,
+privacy advocates,,,,
+privacy notice,Noun,,,
+privacy officer,Noun,,,
+privacy-enhancing,,,,
+private,,,,
+private,Adjective,,,
+private browsing,,,,
+private key (secret key),Noun,,مفتاح سري,
+privoxy,Noun,,,
+probing,Verb,,,
+process,,,,
+process,Noun,,عملية,
+process,Verb,[Signal],,
+processed,Adjective,,,
+processor,,,,
+profile,Noun,[Signal],تشكيلة,
+program,Noun,,,
+proof,Noun,,,
+proofs,Noun,,,
+properly,Adverb,,,
+protects,,,,
+protocol,Noun,"[Orbot] A communications protocol is a way of sending data 
between programs or computers. Software programs that use the same protocol can 
talk to each other: so web browsers and web servers speak the same protocol, 
called ""http"". Some protocols use encryption to protect their contents. The 
secure version of the http protocol is called ""https"". Another example of an 
encrypted protocol used by many different programs is OTR (Off-the-Record), a 
protocol for secure  messaging. (Source EFF)",,
+prototype,Noun,,نموذج,
+provide,,,,
+provider,Noun,,,
+providers,,,,
+proxied,Adjective,,,
+proxied site,Noun,,,
+proxy,Noun,[Orbot],,
+proxy,Verb,[Orbot],,
+proxy test,Noun,,,
+proxychains,,,,
+public account ID,Noun,The Martus account's public identifier,معرف 
الحساب العمومي,
+public code,Noun,,الرمز العمومي,
+public key,Noun,,مفتاح علني,
+public key / public account key,Noun,[Martus] The Martus account's public 
key,مفتاح عمومي,
+public key infrastructure,Noun,,بنية تحتية رئيسة عامة,
+publicly,,,,
+publish,,,,
+publish,Verb,,,
+pull,Noun,9,,
+pull,Verb,"In the context of commits (GitHub, GitLab etc.)",,
+punching,Noun,"Networking technique.
+https://en.wikipedia.org/wiki/Hole_punching_(networking)",,
+purpose,,,,
+push framework,Noun,[Signal],,
+push notification,Noun,[Signal],,
+quality-wise,,,,
+qube,Noun,[QubesOS] A user-friendly term for a VM in Qubes OS.,,
+question,Verb,,,
+questionaire,Noun,,,
+queue,Verb,"To form or wait in a line. ""Queued"" messages may be waiting to 
be sent for example. [Signal]",,
+quit,Verb,[Signal],,
+range,,,,
+range,Noun,[Globaleaks],,
+read receipt,Noun,[Signal],,
+read-only,Adjective,,,
+reader,Noun,,,
+receipt,,,,
+receipt,Noun,[Globaleaks],,
+receive,Verb,,,
+receiver,Noun,,,
+recipient,Noun,[Globaleaks] [Signal],مُستلِم,
+recommend,,,,
+recommend,Verb,,,
+reconnect,Verb,,,
+record,Noun,,تسجيلة، تسجيل,
+record,Verb,,,
+records,,,,
+recover,Verb,"Recover data, an account, etc.",استرداد,
+recover an amount,Verb,"Recover money that you have spent, invested, or lent, 
you get the amount back.",,
+redact,,,,
+redacted,Verb,,,
+reenter,Verb,,,
+referral code,Noun,,,
+refund,,,,
+refunded,,,,
+register,Verb,,,
+regular,Adjective,,,
+regular expression,Noun,,,
+reinstall,Verb,[Signal],,
+reject,,,,
+reject,Verb,,,
+relay,,,,
+relay,Noun,[Orbot],,
+relay,Verb,[Signal],,
+relay directory,Noun,,,
+relay node,Noun,[Orbot],,
+relays,,,,
+relays,Noun,,,
+release,Noun,,,
+release,Verb,,,
+release candidate,Noun,,إصدار مرشَّح,
+release notes,Noun,[Signal],,
+relink,Verb,[Signal],,
+reload,,,,
+reload,Verb,[Globaleaks],إنعاش,"أو ""إعادة التحميل"" في 
حال المطالبة بمعلومات محدَّثة"
+rely,,,,
+remaining,Adjective,,,
+remains,,,,
+remove,Verb,,,
+rename,Verb,,,
+render,Verb,,,
+rendering,Adjective,,,
+rendering,Noun,,,
+rent,,,,
+report,,,,
+report,Noun,[Globaleaks],,
+report,Verb,[Signal],,
+reporting,,,,
+repository,Noun,,,
+request,,,,
+request,Noun,[Globaleaks],طلب,
+request,Verb,,,
+required,,,,
+required fields,,,,
+requires,,,,
+rescan,Verb,,,
+research,,,,
+researchers,,,,
+resend,Verb,,,
+reserve,,,,
+reset,Noun,,,
+reset,Verb,[Globaleaks] [Signal] [Orbot],,
+resolver,Noun,,,
+resources,,,,
+restart,Noun,,,
+restart,Verb,[Globaleaks] [Signal] [Orbot],,
+restore,Verb,[Signal] [Orbot],استعادة,
+restrict,,,,
+restricted route,Noun,,,
+restriction,Noun,,,
+retained,Verb,,,
+retrieve,Verb,(from server),جلب,
+review,Verb,,,
+revision,Noun,,,
+revokation certificate,Noun,,,
+revoke,Verb,,,
+revoke ,Verb,,,
+revoked,Adjective,,,
+ring,Verb,[Signal],,
+rip,Verb,,,
+robust,,,,
+role,Noun,[Globaleaks],,
+rooftop,Noun,,,
+room,Noun,,,
+root,Adjective,,,
+root,Verb,,,
+root domain,Noun,,النطاق الرئيسي; النطاق الجذر,
+"root, root directory",Noun,[Orbot],,
+route,Noun,,,
+route,Verb,[Orbot],,
+router,Noun,,,
+router console,Noun,,,
+router console ,Noun,,,
+routing,Noun,,,
+row,Noun,,,
+rule,Noun,,,
+ruleset,Noun,,,
+run,,,,
+run,Verb,,,
+running,,,,
+safe,,,,
+safely,,,,
+safely,Adverb,,,
+safety number,Noun,[Signal],,
+sandbox,Noun,,آلية تحديد الوصول,
+sanitize,Verb,,,
+save,Verb,[Globaleaks],,
+scale,Verb,[Signal],,
+scan,Verb,[Orbot],,
+scope,Noun,[Globaleaks],,
+score,Noun,,,
+scour,Verb,,,
+scramble,Verb,,,
+scroll,Verb,[Signal],,
+scroll bar,Noun,,,
+search,,,,
+search,Verb,[Signal],,
+search engine,Noun,[Orbot],,
+search index,Noun,,,
+search provider,Noun,,,
+second,Noun,,,
+secure,,,,
+secure,Adjective,[Signal] [Orbot],,
+secure,Verb,[Signal],تأمين,
+secureApp,Noun,Name of the application.,,
+securely,Adverb,,,
+security,,,,
+security,Noun,[Orbot],,
+security background,Noun,,خلفية الأمان,
+security level,Noun,,,
+security log,Noun,,سجل الأمان,
+security token,Noun,,,
+security vulnerability,Noun,,,
+seed,Verb,,,
+select,Verb,,,
+selected,Adjective,,,
+selection,Noun,,,
+selector,Noun,[Globaleaks] [Signal],مُنتقي,
+sell,,,,
+sell,Verb,,,
+send,Verb,,,
+sender,Noun,[Signal],,
+separate,Adjective,,منفصل,
+separate,Verb,,,
+server,Noun,[Globaleaks] [Signal] [Orbot],شبكة، خادم,
+service,Noun,,,
+service provider,Noun,,,
+session,Noun,[Signal],,
+set,Noun,,,
+set,Verb,,,
+set up,,,,
+set up,Verb,,إعداد,
+setting,Verb,"P.Ex. ""Error setting new password""",,
+setup,Noun,,إعداد,
+share,,,,
+share,Noun,,,
+share,Verb,,,
+shortly,,,,
+shovel coal,,,,
+shovel coal (slang word),,,,
+show,Verb,,,
+shown,Verb,,,
+shut down,Verb,,,
+shutdown,Noun,,إطفاء,
+shutting down,Verb,[Globaleaks],,
+sidebar,Noun,,شريط جانبي,
+sideload,Verb,x,,
+sign,Noun,,,
+sign,Verb,,,
+sign in,Verb,[Globaleaks],,
+sign out,Verb,,,
+sign up,,,,
+signature,Noun,,,
+signed,Adjective,,,
+signing key,Noun,,,
+signup form,Noun,,,
+similar,,,,
+single,,,,
+site,Noun,Website,,
+site operator,Noun,,,
+size,,,,
+size,Noun,,,
+sizing up,,,,
+slider,Noun,[Signal],,
+small,,,,
+smartphone,Noun,,,
+snail mail,,,,
+software,,,,
+software,Noun,[Globaleaks] [Signal],برنامج,
+source,,,,
+source,Noun,[Globaleaks],,
+spam,Noun,,,
+specific,,,,
+specified,,,,
+specify,Verb,,,
+spend,,,,
+spends,,,,
+spin,Verb,,,
+split,Verb,,,
+split GPG,Noun,"""Split GPG"" is the name of a feature. For reference: 
https://www.qubes-os.org/doc/split-gpg/";,,
+split bar,Noun,,,
+split package,Noun,,,
+sponsor,Noun,,,
+sponsor,Verb,,,
+spoof,Verb,,,
+spoofing,Noun,,,
+spooled,Adjective,[Globaleaks] context: spooled emails,,
+spreadsheet,Noun,,جدول ممتد,
+staff,,,,
+staffing,,,,
+stand up,Verb,,,
+standalone,Adjective,[Signal],,
+standard,Adjective,[Orbot],,
+standard,Noun,,معيار,
+start,Noun,,,
+start,Verb,[Globaleaks],,
+startup,Noun,,,
+state,Noun,,,
+statements,,,,
+statistics,Noun,,,
+status,,,,
+status,Noun,[Globaleaks],حالة,
+stay,Verb,,,
+stay in,Verb,,,
+sticker,Noun,[Signal],,
+stickers,,,,
+stolen,,,,
+stop,Verb,,,
+storage,Noun,[Signal],,
+stream,Noun,,,
+streaming library,Noun,,,
+strip,Verb,,,
+stuff,,,,
+subject,Noun,[Globaleaks],,
+subkey,Noun,,مفتاح تابع,
+subkeys,Noun,,,
+submission,Noun,[Globaleaks],,
+submit,Verb,[Signal],,
+submitter,Noun,[GlobaLeaks],,
+submitting,,,,
+subscription,Noun,,,
+substatus,Noun,[GlobaLeaks],,
+such as,,,,
+suggested,Adjective,,,
+suggestion,Noun,,,
+suitable,Adjective,,,
+summary,,,,
+summary,Noun,,ملخص,
+summary_large_image,,,,
+superuser,Noun,Synonym: root,,
+support,Noun,"[Signal] As in ""support page"" or ""customer support.""",,
+support,Verb,,,
+support portal,Noun,,,
+supported,Adjective,,,
+supporting,,,,
+surveillance,,,,
+surveillance,Noun,[Orbot],,
+sustainability,,,,
+sustainability,Noun,,,
+swarm,Noun,,,
+swipe,Verb,"Swipe up, swipe down [Signal]",,
+switch,Noun,,,
+sync,Verb,[Signal],,
+synthesis,Noun,Repaso y conclusión. En plural es Síntesis también.,,
+sys-firewall,Noun,,,
+system log,Noun,,,
+system's clock,Noun,,,
+t-shirt,,,,
+tab,Noun,,,
+tackle ambitious projects,,,,
+tag,Noun,,وسم,
+tag,Verb,,,
+tagging attack,Conjunction,http://www.i2p2.de/how_threatmodel.html#tagging,,
+tap,Verb,,المس,
+tap to explore,Verb,,,
+tarball,Noun,,,
+target,Noun,,,
+taskbar,Noun,,شريط المهام,
+tax-deductibility,,,,
+tax-deductible,,,,
+tax-exempt,,,,
+taxes,,,,
+team,Noun,,,
+template,Noun,[Globaleaks],قالب,
+template-based VM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM 
which depends on a TemplateVM for its root filesystem.",,
+templates,Noun,,,
+terminal,Noun,,,
+terms of service,Noun,,,
+test bed,Noun,,,
+testing,Noun,,,
+tethering,Noun,[Orbot],,
+text,Noun,,,
+text area,Noun,,,
+text format,Noun,,نسق نصي,
+thank-you,,,,
+thanks,,,,
+theme,Noun,[Signal],,
+third-party,Adjective,,الطرف الثالث,
+third-party service,,,,
+third-party service providers,,,,
+thread,Noun,"A message ""thread"" is also a ""conversation""",,
+threat model,Noun,"A way of narrowly thinking about the sorts of protection 
you want for your data. It's impossible to protect against every kind of trick 
or attacker, so you should concentrate on which people might want your data, 
what they might want from it, and how they might get it. Coming up with a set 
of possible attacks you plan to protect against is called threat modeling. Once 
you have a threat model, you can conduct a risk analysis. (Synonyms: Threat 
modeling) (Source: EFF)",,
+thresholds,Noun,,,
+throttling,Noun,,,
+thumbnail,Noun,[Signal],,
+thumbs up icon,Noun,"As in the emoji called by ""(y)"" or "":thumbsup:""",,
+ticket,Noun,,,
+time out,Verb,,,
+timeout,Noun,[Signal],مهلة,
+timer,Noun,"in computer security, a threat is a potential event that could 
undermine your efforts to defend your data. Threats can be intentional 
(conceived by attackers), or they could be accidental (you might leave your 
computer turned on and unguarded). Source EFF.",,
+timestamp,Noun,"[Signal] Metadata (or ""data about data"") is everything about 
a piece of information, apart from the information itself. So the content of a 
message is not metadata, but who sent it, when, where from, and to whom, are 
all examples of metadata. Legal systems often protect content more than 
metadata: for instance, in the United States, law enforcement needs a warrant 
to listen to a person's telephone calls, but claims the right to obtain the 
list of who you have called far more easily. However, metadata can often reveal 
a great deal, and will often need to be protected as carefully as the data it 
describes. (Source EFF)",,
+timezone,Noun,,,
+timing attack,Noun,,,
+tip,Noun,[Globaleaks] [Signal],نصيحة خاصة، بلاغ,
+title,Noun,[Signal],عنوان,
+title bar,Noun,,,
+to,Adverb,,,
+to ,Adverb,,,
+toggle,Noun,,,
+toggle,Verb,To switch back and forth between two options (ex: on/off) 
[Signal],,
+token,Noun,,شارة,
+tool,Noun,,أداة,
+tool ,,,,
+toolbar,Noun,[Orbot],,
+tools,Noun,,أدوات,
+torification,Noun,[Orbot],,
+torify,Verb,[Orbot],,
+tortification,Noun,,,
+track,,,,
+tracker,Noun,,,
+tracking,Noun,,,
+traffic,Noun,[Orbot],مرور,
+traffic analysis attack,Conjunction,,,
+traffic analysis attack,Noun,[Orbot],,
+traffic-blocking browser extension,Noun,"When you visit a website, your 
browser sends some information to that site's operators -- your IP address, 
other information about your computer, and cookies that link you to previous 
visits using that browser, for instance. If the website includes images and 
content taken from other web servers, that same information is sent to other 
websites as part of downloading or viewing the page. Advertising networks, 
analytics providers, and other data collectors may gather information from you 
in this way.
+You can install additional software that runs alongside your browser and will 
limit how much information is leaked to third-parties in this way. The most 
well-known examples are programs that block advertisements. EFF offers a tool 
called Privacy Badger which is another traffic-blocking extension.
+Source EFF.",إضافة للمتصفح تمنع النقل,عند زيارة م
وقع على شبكة الإنترنت، يرسل متصفحك بعض الم
علومات لمشغلي ذلك الموقع - عنوان IP الخاص بك، 
وغيرها من المعلومات عن جهاز الكمبيوتر 
الخاص بك، والكوكيز (سجل التتبع) التي تربطك 
بزياراتك السابقة للموقع من نفس المتصفح م
ثلاً. إذا كان الموقع يتضمن صوراً أو محتوى 
آخر من مخدمات أخرى على الإنترنت، يمكن إرسال 
نفس المعلومات إلى المخدمات الأخرى أيضاً 
كجزء من عملية تحميل أو عرض الصفحة. قد تجمع 
شبكات الإعلانات ومزودو خدمات تحليل الزوار 
وغيرهم معلوماتك بهذه الطريقة. يمكنك تثبيت 
برمجيات إضافية تعميل بالتوازي مع متصفحك وتح
 د من كم المعلومات التي تتسرب إلى أطراف 
ثالثة بهذه الطريقة. أغلب الأمثلة المعروفة 
هي برامج تحجب الإعلانات. توفر الـEFF أداة 
تدعى Privacy Badger وهي إضافة للمتصفح تمنع نقل تلك 
المعلومات.
+trainer,Noun,,,
+training,Noun,"(awareness raising session - concientización, 
sensibilización)",,
+transparent,Adjective,,,
+transport encryption,Noun,"Encrypting data as it travels across the network, 
so that others spying on the network cannot read it.
+Synonyms: transport-layer encryption.
+Source EFF.",تشفير النقل,"""تشفير البيانات أثناء 
انتقالها عبر الشبكة، بحيث لا يستطيع 
قراءتها من يتجسس على الشبكة."" (EFF)"
+transport layer encryption,Noun,"Encrypting data as it travels across the 
network, so that others spying on the network cannot read it.
+Synonyms: Transport encryption.
+Source EFF.",تشفير النقل,"""تشفير البيانات أثناء 
انتقالها عبر الشبكة، بحيث لا يستطيع 
قراءتها من يتجسس على الشبكة."" (EFF)"
+transport layer security,Noun,"The technology that permits you to maintain a 
secure, encrypted connection between your computer and some of the websites and 
Internet services that you visit. When you're connected to a website through 
this technology, the address of the website will begin with HTTPS rather than 
HTTP. Officially, its name was changed to Transport Layer Security (TLS) in 
1999, but many people still use the old name, Secure Sockets Layer (SSL).
+Synonyms: Secure Sockets Layer (SSL).
+Source EFF.",,
+trash,Noun,,سلة المهملات,
+trashcan icon,Noun,,,
+tray,Noun,,,
+triggered,Adjective,,,
+troubleshooting,Noun,,,
+trust,Noun,,,
+trust,Verb,,,
+trust on first use,Noun,"TOFU, 
https://en.wikipedia.org/wiki/Trust_on_first_use";,,
+tunnel,Noun,,,
+tunnel,Verb,,,
+tunneling,Adjective,,,
+tunneling,Noun,,,
+turn off,Verb,,إيقاف,
+turn on,Verb,,تشغيل,
+tweet,Noun,,,
+tweet,Verb,,,
+two-factor authentication (2FA),Noun,"""Something you know, and something you 
have."" Login systems that require only a username and password risk being 
broken when someone else can obtain (or guess) those pieces of information. 
Services that offer two-factor authentication also require you to provide a 
separate confirmation that you are who you say you are. The second factor could 
be a one-off secret code, a number generated by a program running on a mobile 
device, or a device that you carry and that you can use to confirm who you are. 
Companies like banks, and major internet services like Google, Paypal and 
Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",توثيق ثنائي,"""'شيء تعرفه، وشيء تم
لكه'. أنظمة تسجيل الدخول التي تتطلب اسم م
ستخدم وكلمة مرور فقط معرضة للاقتحام عندما 
يحصل (أو يخمن) شخص آخر تلك المعلومات. الخدم
ات التي تقدم التوثيق الثنائي تتطلب أيضاً 
توفير طريقة أخرى لتأكيد أن الشخص الذي تزعم
ه. العامل الثاني قد يكون رمزاً سرياً لمرة 
واحدة، أو رقما يولده تطبيق على هاتفك الذكي، 
أو جهازاً يمكنك حمله واستخدامه لتأكيد 
هويتك. تقدم الشركات مثل البنوك وخدمات 
الإنترنت الكبيرة مثل Google وPayPal و تويتر إم
كانية التوثيق الثنائي."" (EFF)"
+two-step verification,Noun,"""Something you know, and something you have."" 
Login systems that require only a username and password risk being broken when 
someone else can obtain (or guess) those pieces of information. Services that 
offer two-factor authentication also require you to provide a separate 
confirmation that you are who you say you are. The second factor could be a 
one-off secret code, a number generated by a program running on a mobile 
device, or a device that you carry and that you can use to confirm who you are. 
Companies like banks, and major internet services like Google, Paypal and 
Twitter now offer two-factor authentication. (Synonyms: Two-factor 
authentication, multi-factor authentication) (Source EFF)",توثيق 
ثنائي,"""'شيء تعرفه، وشيء تملكه'. أنظمة تسجيل 
الدخول التي تتطلب اسم مستخدم وكلمة مرور فقط 
معرضة للاقتحام عندما يحصل (أو يخمن) شخص آخر 
تلك المعÙ
 „ومات. الخدمات التي تقدم التوثيق الثنائي 
تتطلب أيضاً توفير طريقة أخرى لتأكيد أن 
الشخص الذي تزعمه. العامل الثاني قد يكون رم
زاً سرياً لمرة واحدة، أو رقما يولده تطبيق 
على هاتفك الذكي، أو جهازاً يمكنك حمله 
واستخدامه لتأكيد هويتك. تقدم الشركات مثل 
البنوك وخدمات الإنترنت الكبيرة مثل Google 
وPayPal و تويتر إمكانية التوثيق الثنائي."" (EFF)"
+type,Noun,,,
+type,Verb,,,
+unable,Adjective,[Globaleaks],,
+unabled,Adjective,,,
+unavailable,Adjective,[Globaleaks],,
+unblock,Verb,[Signal],,
+uncheck,Verb,,,
+unchoke,Verb,,,
+undelete software,Noun,"Most devices let you delete data from them; For 
instance, you can drag a file to the Trash icon, or press delete in a photo 
album. But deletion does not always mean that the original data is gone. 
Undelete programs are applications that can be used by the device's owner, or 
others with access to the device, to restore some data. Undelete programs are 
useful for those who accidentally delete their own data, and to those whose 
data might have been sabotaged, such as a photographer who has been compelled 
to remove images from their camera. However, those same programs can be a 
threat to anyone who wants to permanently erase confidential data.
+Source EFF.",برمجيات إلغاء الحذف,"""تسمح لك معظم 
الأجهزة بحذف البيانات منها؛ مثلاً، يمكنك 
سحب ملف إلى أيقونة سلة المهملات، أو ضغط زر 
الحذف ضمن ألبوم صور. ولكن الحذف لا يعني دائم
ا أن البيانات الأصلية لم تعد موجودة. برامج 
إلغاء الحذف هي تطبيقات يمكن استخدامها من 
قبل مالك الجهاز أو من قبل الآخرين لاستعادة 
بعض البيانات. برامج إلغاء الحذف مفيدة لمن 
قام بحذف بيانات بطريق الخطأ، ولأولئك الذين 
تم تخريب بياناتهم، مثل مصور تم إجراءه على 
حذف الصور من كاميرته. ولكن هذه البرامج تشكل 
تهديداً لأي شخص يرغب بحذف بياناته السرية 
بشكل دائم. انظر دليل: كيف تحذف بياناتك بشÙ
 ƒÙ„ آمن لنصائح حول كيفية مسح البيانات، وم
علومات عن كيفية عمل برامج إلغاء الحذف على 
الأجهزة الحديثة."" (EFF)"
+undo,Verb,,,
+unexpected,Adjective,,,
+unfollow,Verb,,,
+uninstall,Verb,,,
+unit test,Noun,http://en.wikipedia.org/wiki/Unit_test,,
+unknown,Adjective,,,
+unlink,Verb,[Signal],,
+unlock,Verb,,فك القفل,
+unlocked,Adjective,,غير مقفل,
+unmount device,Verb,,فك التجهيزة,
+"unmount, unmounting",Verb,,,
+unpack,Verb,,,
+unparseable,Adjective,,,
+unpin,Verb,"Unpin a tab, a site in a browser.",,
+unreachable,Adjective,,,
+unrecognized,Adjective,,,
+unrecognized ,Adjective,,,
+unrestricted,Adjective,,,
+unsafe,Adjective,,,
+untrusted,Adjective,,,
+up-to-date,Adjective,,,
+update,Noun,[Signal],,
+update,Verb,[Signal],,
+upgrade,Noun,[Signal],,
+upgrade,Verb,[Signal],,
+upload,Noun,[Globaleaks] [Orbot],,
+upload,Verb,[Globaleaks] [Orbot],رفع,
+uploader,Noun,,,
+uploading,Noun,,,
+upstream proxy,Noun,,,
+uptime,Noun,,,
+usability,Noun,,,
+user,Noun,,,
+user ID,Noun,user identification,معرِّف المستخدم,
+user agent,Noun,,,
+user data,Noun,,,
+user guide,Noun,,دليل المستخدم,
+user manual,Noun,,,
+user settings,Noun,,إعدادات المستخدم,
+username,Noun,[Globaleaks] [Orbot],إسم المستخدم,
+validation,Noun,,,
+variable,Noun,,,
+"vcard, v-card",Noun,,,
+verification,Noun,[Signal],,
+verified,Adjective,[Signal],,
+verify,Verb,[Signal],,
+version,Noun,[Signal],,
+version,Verb,Create a new version of a record or file while still maintaining 
past versions of the file.,,
+versioned,Adjective,,مُجزَّء,
+video chat,Noun,,,
+view,Noun,,,
+view,Verb,,,
+viewport,Noun,,,
+volume,Noun,,,
+volunteer,Noun,,,
+vulnerability,Noun,,,
+vulnerable,Adjective,,,
+wallet,Noun,,,
+warning,Noun,,تحذير,
+watch,Verb,,,
+watch list,Noun,,لائحة المشاهدات,
+watermark,Noun,,علامة مائية,
+wear leveling,Noun,"Some forms of digital storage, like the flash memory used 
in solid-state drives (SSD) and USB sticks, can wear out if overwritten many 
times. Wear leveling is a method that spreads the writing of data evenly across 
all of the media to prevent one part of it being overwritten too many times. 
Its benefit is that it can make devices last longer. The danger for 
security-conscious users is that wear leveling interferes with secure erase 
programs, which deliberately try to overwrite sensitive files with junk data in 
order to permanently erase them. Rather than trusting secure erase programs 
with files stored on SSD or USB flash drives, it can be better to use full-disk 
encryption. Encryption avoids the difficulty of secure erasing by making any 
file on the drive difficult to recover without the correct passphrase.
+Source EFF.",توزيع الاهتلاك,"""يمكن لبعض أشكال 
التخزين الرقمي (مثل ذاكرة الفلاش المستخدمة 
في أقراص الحالة الصلبة SSD وذواكر USB) أن تتلف 
عند الكتابة عليها بشكل متكرر لمرات عديدة. 
توزيع الاهتلاك هو أسلوب يوزع كتابة 
البيانات بشكل متساو عبر جميع أجزاء وسيط 
التخزين لمنع تلف قسم واحد عبر الكتابة عليه م
راراً وتكراراً. فائدته هي أنه يجعل الأجهزة 
تدوم لفترة أطول. خطر ذلك على المستخدم الذي 
يهمه الأمن هي أن توزيع الاهتلاك يتدخل ببرام
ج الحذف الآمن، والتي تحاول أن تكتب فوق الم
لفات الحساسة ببيانات عشوائية لضمان حذفها 
بشكل دائم. بدل الاعتماد على برامج الحذف الآم
ن للØ
 ªØ¹Ø§Ù…Ù„ مع الملفات المخزنة على سواقات SSD أو 
USB، يفضل استخدام تشفير القرص بأكمله. يتجنب 
التشفير صعوبة حذف الملفات بشكل آمن عبر جعل 
استرجاع أي ملف على السواقة صعباً دون عبارة 
المرور الصحيحة."" (Source: EFF)"
+web,Noun,,,
+web browser,Noun,[Orbot],,
+web connectivity,Noun,,,
+"web connectivity, connectivity",Noun,[Orbot],,
+web interface,Noun,,,
+web-based proxy,Noun,"A website that lets its users access other, blocked or 
censored websites. Generally, the web proxy will let you type a web address (or 
URL) onto a web page, and then redisplay that web address on the proxy page. 
Easier to use than most other censorship-circumventing services.
+Source EFF.",,
+webmail provider,Noun,,مزود خدمة البريد الإكتروني 
عبر الشبكة العنكبوتية,
+webserver,Noun,,,
+website,Noun,,موقع الوِبْ,
+week,Noun,,,
+whistleblower,Noun,[Globaleaks],,
+whistleblowing,Noun,[Globaleaks],,
+whitelist,Noun,,,
+whole device,Noun,As in “whole device encryption.”,,
+widget,Noun,,,
+wildcards,Noun,,حروف البدل,
+window,Noun,,,
+wipe,Verb,,طمس,
+wizard / assistant,Noun,A “getting started” wizard / assitant,حكيم / م
رشد,
+work,Verb,,,
+work-around,Noun,,,
+world wide web,Noun,,,
+world-leading,Adjective,,,
+wrapper,Noun,,,
+x,Noun,,,
+year,Noun,,,
+yes,Noun,,نعم,
+zero day,Noun,"A flaw in a piece of software or hardware that was previously 
unknown to the maker of the product. Until the manufacturers hear of the flaw 
and fix it, attackers can use it for their own purposes.
+Source EFF.",,
+zip,Verb,To compress a file or directory so that is is smaller in size. 
[Signal],,
+…,Conjunction,"Punctuation, not a conjunction, however “punctionation” 
is not an option in Transifex",,

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to