Other components
Component | Translated | Unfinished | Unfinished words | Unfinished characters | Untranslated | Checks | Suggestions | Comments | |
---|---|---|---|---|---|---|---|---|---|
threats.about | 0% | 13 | 689 | 4,410 | 0 | 0 | 0 | 0 | |
|
|||||||||
earsandeyes.about | 0% | 51 | 1,485 | 9,465 | 0 | 0 | 0 | 0 | |
|
|||||||||
threats.tutorial | 0% | 68 | 2,609 | 16,788 | 0 | 0 | 0 | 0 | |
|
|||||||||
Glossary glossary | 1% | 150 | 327 | 2,706 | 150 | 0 | 12 | 0 | |
|
|||||||||
earsandeyes | 7% | 286 | 7,913 | 47,446 | 285 | 0 | 0 | 0 | |
|
|||||||||
earsandeyes.contribute | 16% | 5 | 66 | 401 | 0 | 0 | 0 | 0 | |
|
|||||||||
resources.contribute | 18% | 9 | 207 | 1,247 | 0 | 0 | 0 | 0 | |
|
|||||||||
core.translations | 34% | 25 | 759 | 4,938 | 0 | 0 | 0 | 0 | |
|
|||||||||
resources | 89% | 8 | 72 | 507 | 8 | 0 | 0 | 0 | |
|
|||||||||
core | 91% | 10 | 33 | 275 | 10 | 0 | 0 | 0 | |
|
Overview
Project website | notrace.how |
---|---|
Instructions for translators | See this page. |
Project maintainers | ntp |
Translation license | Proprietary |
Translation process |
|
File mask | threats/*.json |
Monolingual base language file | threats/en.json |
Translation file |
Download
threats/pt_BR.json
|
Last change | Nov. 15, 2024, 8:35 p.m. |
Last author | No Trace Project |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 560 | 30,953 | 222,815 | |||
Translated | 0% | 0 | 0% | 0 | 0% | 0 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 0% | 0 | 0% | 0 | 0% | 0 |
Failing checks | 1% | 1 | 1% | 1 | 1% | 4 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 100% | 560 | 100% | 30,953 | 100% | 222,815 |
Quick numbers
and previous 30 days
Trends of last 30 days
+1%
Hosted words
+100%
+2%
Hosted strings
+100%
—
Translated
—
+50%
Contributors
+100%
ntp
Source string changed |
|
ntp
New strings to translate |
20 new strings to translate appeared to the translation.
6 days ago
|
ntp
Resource update |
The "
threats/en.json " file was changed.
6 days ago
|
None
String updated in the repository |
|
None
String updated in the repository |
|
None
String updated in the repository |
|
None
String updated in the repository |
|
None
String updated in the repository |
|
None
String updated in the repository |
|
None
String updated in the repository |
|
560 | File in original format as translated in the repository | JSON nested structure file | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
560 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
560 | Unfinished strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
# Collection
Sources of CCTV footage include:
- Cameras in the street or in other public locations.
- Cameras in private buildings (e.g. shops, offices).
- Public transport cameras on buses, trains, highways, etc.
- Home surveillance systems such as Amazon Ring.
- In-vehicle surveillance systems like those found on Teslas.
CCTV cameras can vary widely in quality, range, night vision capabilities, presence of microphones, etc.
# Storage
After its collection, CCTV footage is often stored for some time (from days to indefinite durations) before being erased.
# Analysis
An adversary can analyze CCTV footage:
- In real time if the cameras are integrated into a central network. Real-time analysis can take place either as part of routine surveillance or during exceptional events (e.g. demonstrations).
- Retroactively if the CCTV footage has been stored. Retroactive analysis can help identify a suspect by their [face](tl://techniques/forensics/facial-recognition.html), [gait](tl://techniques/forensics/gait-recognition.html), [voice](tl://techniques/forensics/linguistics.html), etc.
Analysis of CCTV footage can be performed:
- By humans.
- By automated systems such as automated license plate readers or [facial recognition systems](tl://techniques/forensics/facial-recognition.html).
# See also
- [You Can't Catch What You Can't See: Against Video Surveillance](res://#catch-see).
- The topics
["[Video surveillance](res://#topic=video-surveillance)" and["[Automated license plate readers"](res://#topic=automated-license-plate-readers)".