Translations

Difference between revisions of "Complete manual/77/en"

From Gender and Tech Resources

(Created page with "Si utilizas una sola identidad para todos tus dominios sociales, o si siempre utilizas tu nombre real (por ejemplo el que aparece en tus documentos oficiales) cuando estas en...")
 
(Importing a new version from external source)
 
Line 1: Line 1:
Si utilizas una sola identidad para todos tus dominios sociales, o si siempre utilizas tu nombre real (por ejemplo el que aparece en tus documentos oficiales) cuando estas en linea, resulta más fácil  recopilar información acerca tuyo e identificar tus vulnerabilidades. Por ejemplo, si revelas en un sitio para citas en línea que te gusta un tipo particular de persona, un atacante podría probar de engañarte con un perfil falso que se parece a tus gustos personas y luego chantajear-te o arruinar tus actividades profesionales o publicas dando a conocer tus preferencias. Otro ejemplo consistiría en un posible empleador que encuentra mensajes potencialmente embarazosos o información acerca tuyo en relación con tus dominios sociales personales y que no querías forzosamente compartir.
+
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in an online dating site that you like a particular kind of person, an attacker who wants to ruin your work or advocacy activities might trick you into sharing personal information with a fake profile designed according to your preferences, and then use any sensitive information you’ve shared with them through that fake account to blackmail you. In a generic everyday example, a prospective employer may find potentially embarrassing posts or information about you from your personal domains that you’d wish they wouldn’t have accessed.

Latest revision as of 11:15, 21 March 2018

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (Complete manual)
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in an online dating site that you like a particular kind of person, an attacker who wants to ruin your work or advocacy activities might trick you into sharing personal information with a fake profile designed according to your preferences, and then use any sensitive information you’ve shared with them through that fake account to blackmail you. In a generic everyday example, a prospective employer may find potentially embarrassing posts or information about you from your personal domains that you’d wish they wouldn’t have accessed.
TranslationIf you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in an online dating site that you like a particular kind of person, an attacker who wants to ruin your work or advocacy activities might trick you into sharing personal information with a fake profile designed according to your preferences, and then use any sensitive information you’ve shared with them through that fake account to blackmail you. In a generic everyday example, a prospective employer may find potentially embarrassing posts or information about you from your personal domains that you’d wish they wouldn’t have accessed.

If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in an online dating site that you like a particular kind of person, an attacker who wants to ruin your work or advocacy activities might trick you into sharing personal information with a fake profile designed according to your preferences, and then use any sensitive information you’ve shared with them through that fake account to blackmail you. In a generic everyday example, a prospective employer may find potentially embarrassing posts or information about you from your personal domains that you’d wish they wouldn’t have accessed.