Update the Mac and Windows bundles
This commit is contained in:
@ -23,8 +23,8 @@ except ImportError:
|
||||
# Constants
|
||||
|
||||
CURRENT_I2P_VERSION = '1.7.0'
|
||||
CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.07.2'
|
||||
CURRENT_I2P_OSX_VERSION = CURRENT_I2P_VERSION
|
||||
CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.7.4'
|
||||
CURRENT_I2P_OSX_VERSION = '1.7.1'
|
||||
|
||||
CANONICAL_DOMAIN = 'geti2p.net'
|
||||
|
||||
|
@ -54,6 +54,7 @@ def get_meetings_ids(num=0):
|
||||
# iterate over all files
|
||||
for f in v[2]:
|
||||
# ignore all non-.rst files
|
||||
print("Meeting file found", f)
|
||||
if not f.endswith('.rst'):
|
||||
continue
|
||||
try:
|
||||
|
@ -87,4 +87,4 @@
|
||||
(04:38:54 PM) eyedeekay: Anything else on 4?
|
||||
(04:39:07 PM) zlatinb: not from me, eot
|
||||
(04:40:26 PM) eyedeekay: Anything else for the meeting? timeout 1m
|
||||
(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd
|
||||
(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd
|
@ -8,4 +8,4 @@ Quick recap
|
||||
|
||||
eyedeekay,
|
||||
zzz,
|
||||
zlatinb
|
||||
zlatinb
|
File diff suppressed because it is too large
Load Diff
@ -1,22 +1,22 @@
|
||||
# Arabic translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2021-04-26 14:55+0000\n"
|
||||
"Last-Translator: zzzi2p\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
|
||||
"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ar\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -24,34 +24,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -59,20 +48,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -82,15 +64,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -105,10 +83,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -126,52 +102,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -179,19 +141,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -203,32 +161,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -237,36 +183,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -274,10 +207,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -291,7 +222,7 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -497,8 +428,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -517,10 +447,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -528,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -567,8 +496,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -705,4 +634,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# German translations for I2P.
|
||||
# Copyright (C) 2020 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# a b <ahx7@posteo.net>, 2017
|
||||
# Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021
|
||||
@ -10,17 +10,18 @@
|
||||
# tk2015, 2014
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2020-11-16 17:04+0000\n"
|
||||
"PO-Revision-Date: 2021-02-07 12:13+0000\n"
|
||||
"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021\n"
|
||||
"Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: de\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -28,74 +29,37 @@ msgstr "I2P im Vergleich zu Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für"
|
||||
" Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher "
|
||||
"zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' "
|
||||
"gerecht zu werden. Während Freenet als verteilter Datenspeicher "
|
||||
"konzipiert wurde, hat die Comunity darüber hinaus Anwendungen "
|
||||
"programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung "
|
||||
"stellt wie statische Webseiten und Nachrichtenboards. "
|
||||
msgstr "Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' gerecht zu werden. Während Freenet als verteilter Datenspeicher konzipiert wurde, hat die Comunity darüber hinaus Anwendungen programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung stellt wie statische Webseiten und Nachrichtenboards. "
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\n"
|
||||
"Freenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, "
|
||||
"auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, "
|
||||
"dass beliebte und viel verwendete Daten sehr effektiv verteilt werden "
|
||||
"können. I2P selbst bietet keine derartige Funktionalität und wird diese "
|
||||
"auch in Zukunft nicht tun.\n"
|
||||
"Auf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym "
|
||||
"kommunizieren wollen durch Websites, Message Boards, File Sharing "
|
||||
"Programme etc. Es wurden Versuche unternommen einen verteilten "
|
||||
"Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung"
|
||||
" von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts "
|
||||
"davon in breiterer Verwendung."
|
||||
msgstr "Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\nFreenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, dass beliebte und viel verwendete Daten sehr effektiv verteilt werden können. I2P selbst bietet keine derartige Funktionalität und wird diese auch in Zukunft nicht tun.\nAuf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym kommunizieren wollen durch Websites, Message Boards, File Sharing Programme etc. Es wurden Versuche unternommen einen verteilten Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts davon in breiterer Verwendung."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -105,40 +69,28 @@ msgstr "I2P im Vergleich zu anderen Projekten"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere "
|
||||
"Netzwerke</a> erörtert:"
|
||||
msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Der Inhalt dieser Seite wird fortwährend aktualisiert und diskutiert, und"
|
||||
" wir begrüßen Kommentare und Ergänzungen.\n"
|
||||
"Ein eigener Vergleich kann beigesteuert werden, indem man ein <a "
|
||||
"href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -155,58 +107,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Die meisten der nachfolgenden Abschnitte sind eher alt und vielleicht "
|
||||
"nicht mehr zutreffend.\n"
|
||||
"Für eine Übersicht bestehender Vergleiche siehe die\n"
|
||||
"<a href=\"%(comparison)s\">Hauptseite für Netzwerkvergleiche</a>.\n"
|
||||
"Ein eigener Vergleich kann beigesteuert werden, indem man ein\n"
|
||||
"<a href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -214,19 +146,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -238,32 +166,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -272,36 +188,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -309,10 +212,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -326,7 +227,7 @@ msgstr "Bezahlte VPN-Dienste"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -388,9 +289,7 @@ msgstr "Vergleich der Tor- und I2P-Terminologie"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre "
|
||||
"Terminologie weitgehend anders."
|
||||
msgstr "Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre Terminologie weitgehend anders."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -463,7 +362,7 @@ msgstr "Versteckter Dienst"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -534,15 +433,10 @@ msgstr "Vorteile von Tor gegenüber I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-"
|
||||
"Communities viel häufiger vor; profitiert von\n"
|
||||
"wissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\n"
|
||||
"hat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
|
||||
msgstr "Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-Communities viel häufiger vor; profitiert von\nwissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\nhat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -558,34 +452,24 @@ msgstr "Hat mehr Entwickler, davon mehrere mit finanzieller Unterstützung"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht "
|
||||
"und Bridges\n"
|
||||
"(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese "
|
||||
"sind noch nicht umgesetzt)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht und Bridges\n(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese sind noch nicht umgesetzt)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Groß genug, dass es sich auf Blocking und DOS-Attacken einstellen musste"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von "
|
||||
"Exit-Knoten"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von Exit-Knoten"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Bessere Dokumentation, hat wissenschaftliche Arbeiten und "
|
||||
"Spezifikationen,\n"
|
||||
"bessere Website, viel mehr Übersetzungen"
|
||||
msgstr "Bessere Dokumentation, hat wissenschaftliche Arbeiten und Spezifikationen,\nbessere Website, viel mehr Übersetzungen"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -605,9 +489,7 @@ msgstr ""
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Ein Kern von Knoten mit hoher Kapazität\n"
|
||||
"sorgt für höheren Durchsatz und niedrigere Latenz"
|
||||
msgstr "Ein Kern von Knoten mit hoher Kapazität\nsorgt für höheren Durchsatz und niedrigere Latenz"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -619,8 +501,8 @@ msgstr "Vorteile von I2P gegenüber Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -631,11 +513,7 @@ msgstr "Vollkommen verteilt und selbst-organisierend"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung"
|
||||
"\n"
|
||||
"ausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu "
|
||||
"vertrauen"
|
||||
msgstr "Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung\nausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu vertrauen"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
@ -645,9 +523,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-"
|
||||
"Attacken gab"
|
||||
msgstr "Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-Attacken gab"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -682,10 +558,7 @@ msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Unidirektionale Tunnel statt bidirektionaler\n"
|
||||
"Schaltungen, was die Zahl der zu kompromittierenden Stellen\n"
|
||||
"verdoppelt um an dieselbe Information zu gelangen."
|
||||
msgstr "Unidirektionale Tunnel statt bidirektionaler\nSchaltungen, was die Zahl der zu kompromittierenden Stellen\nverdoppelt um an dieselbe Information zu gelangen."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -744,9 +617,7 @@ msgstr "Weitere potentielle Vorteile von I2P, aber noch nicht implementiert"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...und die vielleicht niemals implementiert werden, also nicht darauf "
|
||||
"verlassen!"
|
||||
msgstr "...und die vielleicht niemals implementiert werden, also nicht darauf verlassen!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
@ -768,4 +639,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
@ -4561,7 +4561,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:72
|
||||
msgid "for"
|
||||
msgstr ""
|
||||
msgstr "nach"
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:74
|
||||
msgid "in order to obscure your local time zone."
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,29 +1,31 @@
|
||||
# Spanish translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Adolfo Jayme Barrientos, 2013
|
||||
# Daniel Mustieles <inactive+leo@transifex.com>, 2013
|
||||
# Adolfo Jayme-Barrientos, 2013
|
||||
# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
|
||||
# m1xxy <m1xxy@mail.i2p>, 2011
|
||||
# Oliver Trash <oliver.trasshh@gmail.com>, 2013
|
||||
# strel, 2016
|
||||
# strel, 2013
|
||||
# trolly, 2013
|
||||
# Trolly, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-10-04 00:26+0000\n"
|
||||
"Last-Translator: erinm\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: strel, 2016\n"
|
||||
"Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: es\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -31,85 +33,39 @@ msgstr "Comparación de I2P con Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet es una red completamente distribuida, red anónima de publicación "
|
||||
"par a par, que ofrece una forma segura de almacenar datos, y también "
|
||||
"enfocada en solucionar los problemas de carga y desbordamientos. Mientras"
|
||||
" que Freenet está diseñada como un almacén distribuido de datos, la gente"
|
||||
" ha construido aplicaciones sobre el sistema para tener otras "
|
||||
"comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
msgstr "Freenet es una red completamente distribuida, red anónima de publicación par a par, que ofrece una forma segura de almacenar datos, y también enfocada en solucionar los problemas de carga y desbordamientos. Mientras que Freenet está diseñada como un almacén distribuido de datos, la gente ha construido aplicaciones sobre el sistema para tener otras comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparado con I2P, Freenet ofrece substanciales beneficios - es un "
|
||||
"sistema distribuido de almacenamiento de datos, mientras que I2P no lo "
|
||||
"es, permitiendo a la gente obtener al contenido publicado por otros "
|
||||
"incluso cuando el que lo ha publicado no esté online. Además es capaz de "
|
||||
"distribuir eficientemente la información más utilizada. I2P no tiene ni "
|
||||
"tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para "
|
||||
"los usuarios que simplemente quieren comunicarse con otros anónimamente a"
|
||||
" través de webs, foros, aplicaciones de compartición de archivos, etc. "
|
||||
"Ha habido varios intentos de desarrollar un sistema de almacenamiento "
|
||||
"distribuido funcionando sobre I2P, (más recientemente un port de <a "
|
||||
"href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso "
|
||||
"general."
|
||||
msgstr "Comparado con I2P, Freenet ofrece substanciales beneficios - es un sistema distribuido de almacenamiento de datos, mientras que I2P no lo es, permitiendo a la gente obtener al contenido publicado por otros incluso cuando el que lo ha publicado no esté online. Además es capaz de distribuir eficientemente la información más utilizada. I2P no tiene ni tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para los usuarios que simplemente quieren comunicarse con otros anónimamente a través de webs, foros, aplicaciones de compartición de archivos, etc. Ha habido varios intentos de desarrollar un sistema de almacenamiento distribuido funcionando sobre I2P, (más recientemente un port de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso general."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Sin embargo, e incluso ignorando los problemas de implementación, hay "
|
||||
"algunas preocupaciones sobre la escalabilidad y el anonimato de algunos "
|
||||
"algoritmos de Freenet, debido básicamente a la heurística de ruteo de "
|
||||
"Freenet. La unión de varias técnicas puede desalentar el hacer varios "
|
||||
"tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo "
|
||||
"podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos "
|
||||
"de los análisis sobre los algoritmos han dado resultados satisfactorios, "
|
||||
"pero aún hay esperanzas. Al final, Freenet nos proporciona bastante "
|
||||
"anonimato contra cualquier atacante que no tenga los recursos necesarios "
|
||||
"para análisis completos."
|
||||
msgstr "Sin embargo, e incluso ignorando los problemas de implementación, hay algunas preocupaciones sobre la escalabilidad y el anonimato de algunos algoritmos de Freenet, debido básicamente a la heurística de ruteo de Freenet. La unión de varias técnicas puede desalentar el hacer varios tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos de los análisis sobre los algoritmos han dado resultados satisfactorios, pero aún hay esperanzas. Al final, Freenet nos proporciona bastante anonimato contra cualquier atacante que no tenga los recursos necesarios para análisis completos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -117,49 +73,28 @@ msgstr "Comparando I2P con otros proyectos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Hay muchas otras buenas aplicaciones y proyectos trabajando en "
|
||||
"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus "
|
||||
"esfuerzos. Esto no es una lista completa de recursos para el anonimato - "
|
||||
"ambos \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a> y los <a "
|
||||
"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con "
|
||||
"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos "
|
||||
"proyectos destacan como para comparaciones adicionales. Los siguientes "
|
||||
"proyectos tienen webs con comparaciones individuales:"
|
||||
msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Los siguientes proyectos son discutidos en la <a "
|
||||
"href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Los contenidos de esta página pueden ser cambiados o discutidos, y "
|
||||
"apreciamos los comentarios y añadidos. Puede contribuir al análisis "
|
||||
"creando un <a href=\"%(trac)s\">nuevo ticket en el Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -176,232 +111,116 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"La mayoría de las secciones siguientes son bastante viejas, y puede que "
|
||||
"no sean precisas. Para una vista rápida de las comparaciones disponibles,"
|
||||
" vea la <a href=\"%(comparison)s\">página principal de comparaciones</a>."
|
||||
" Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo "
|
||||
"ticket en el Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par "
|
||||
"anónimas con proxies para el anonimato, permitiendo a la gente enviar "
|
||||
"datos fuera a través de redes de mezcla de baja latencia. Morphmix "
|
||||
"incluye unos algoritmos de detección de colisiones bastante interesante y"
|
||||
" defensas contra Sybil, mientras que Tarzan hace uso de la escasez de "
|
||||
"direcciones IP para obtener lo mismo. Las dos principales diferencias "
|
||||
"entre estos dos sistemas e I2P tienen que ver con el <a "
|
||||
"href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de "
|
||||
"outproxies (al contrario que el anonimato proporcionado para ambos, el "
|
||||
"que envía y el que recibe). El código está disponible para ambos "
|
||||
"sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
msgstr "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par anónimas con proxies para el anonimato, permitiendo a la gente enviar datos fuera a través de redes de mezcla de baja latencia. Morphmix incluye unos algoritmos de detección de colisiones bastante interesante y defensas contra Sybil, mientras que Tarzan hace uso de la escasez de direcciones IP para obtener lo mismo. Las dos principales diferencias entre estos dos sistemas e I2P tienen que ver con el <a href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de outproxies (al contrario que el anonimato proporcionado para ambos, el que envía y el que recibe). El código está disponible para ambos sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion y Mixmaster son redes que soportan correos anónimos contra "
|
||||
"adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia"
|
||||
" sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) "
|
||||
"quizás sean adecuadas para satisfacer el modelo de amenazas de estos "
|
||||
"adversarios, funcionando en paralelo con las necesidades de baja latencia"
|
||||
" de los usuarios, para proporcionar un gran set de anonimato. El soporte "
|
||||
"de alta latencia en el ruter de I2P puede que se añada o no en un futuro "
|
||||
"distante. Es demasiado pronto para decir si I2P satisfará las necesidades"
|
||||
" de los usuarios que requieran una protección extrema para los correos."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion y Mixmaster son redes que soportan correos anónimos contra adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) quizás sean adecuadas para satisfacer el modelo de amenazas de estos adversarios, funcionando en paralelo con las necesidades de baja latencia de los usuarios, para proporcionar un gran set de anonimato. El soporte de alta latencia en el ruter de I2P puede que se añada o no en un futuro distante. Es demasiado pronto para decir si I2P satisfará las necesidades de los usuarios que requieran una protección extrema para los correos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también"
|
||||
" la aproximación basada en directorios."
|
||||
msgstr "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también la aproximación basada en directorios."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el "
|
||||
"anonimato de las solicitudes web que tiene varios nodos centrales "
|
||||
"(participantes en la cascada) que combinan y mezclan las solicitudes de "
|
||||
"los clientes a través de una secuencia de nodos (la cascada) antes de "
|
||||
"enviarlos por un proxy a la web. El alcance, modelo de amenazas y la "
|
||||
"seguridad son bastantes diferentes a las de I2P, pero para aquellos que "
|
||||
"requieran bastante anonimato pero no están satisfechos con un servicio de"
|
||||
" tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un "
|
||||
"precaución que debe tener todo aquel que se encuentre bajo la "
|
||||
"jurisdicción de los juzgados alemanes, es que el German Federal Bureau "
|
||||
"of Criminal Investigation (FBCI) ha montado un <a "
|
||||
"href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el "
|
||||
"ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad"
|
||||
" es que la información fue sustraída con éxito. Los jueces cambian sus "
|
||||
"mentes basados en las circunstancias, y esta es la evidencia de que si el"
|
||||
" gobierno quisiese la información podrían conseguirla, aunque fuese "
|
||||
"inadmisible más tarde en un juicio)"
|
||||
msgstr "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el anonimato de las solicitudes web que tiene varios nodos centrales (participantes en la cascada) que combinan y mezclan las solicitudes de los clientes a través de una secuencia de nodos (la cascada) antes de enviarlos por un proxy a la web. El alcance, modelo de amenazas y la seguridad son bastantes diferentes a las de I2P, pero para aquellos que requieran bastante anonimato pero no están satisfechos con un servicio de tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un precaución que debe tener todo aquel que se encuentre bajo la jurisdicción de los juzgados alemanes, es que el German Federal Bureau of Criminal Investigation (FBCI) ha montado un <a href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad es que la información fue sustraída con éxito. Los jueces cambian sus mentes basados en las circunstancias, y esta es la evidencia de que si el gobierno quisiese la información podrían conseguirla, aunque fuese inadmisible más tarde en un juicio)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Estos dos sistemas trabajan con el rutado básico <a "
|
||||
"href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer "
|
||||
"negación plausible contra un simple adversario sin colisión. Con el "
|
||||
"rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast"
|
||||
" para encontrar el par o la identidad deseada, y después usan esa "
|
||||
"algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones "
|
||||
"que sólo quieren saber que tienen que ofrecer la gente que está alrededor"
|
||||
" - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se "
|
||||
"obtiene un conjunto de nodos que pueden compartit archivos y mantener el "
|
||||
"anonimato (aunque no se tiene mucho control sobre quién es ese grupo de "
|
||||
"pares)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Estos dos sistemas trabajan con el rutado básico <a href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer negación plausible contra un simple adversario sin colisión. Con el rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast para encontrar el par o la identidad deseada, y después usan esa algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones que sólo quieren saber que tienen que ofrecer la gente que está alrededor - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se obtiene un conjunto de nodos que pueden compartit archivos y mantener el anonimato (aunque no se tiene mucho control sobre quién es ese grupo de pares)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Sin embargo, el algoritmo no escala bien del todo - si la aplicación "
|
||||
"quiere hablar con un par en particular termina haciendo una búsqueda "
|
||||
"broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). "
|
||||
"Esto significa que mientras esas redes trabajan bien a escalas pequeñas, "
|
||||
"no son apropiadas para redes grandes donde alguien quiere ponerse en "
|
||||
"contacto con un par en particular. Esto no quiere decir que este sistema "
|
||||
"no tenga ningún valor, sólo que su aplicación está limitada a situaciones"
|
||||
" donde sus problemas pueden evitarse."
|
||||
msgstr "Sin embargo, el algoritmo no escala bien del todo - si la aplicación quiere hablar con un par en particular termina haciendo una búsqueda broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). Esto significa que mientras esas redes trabajan bien a escalas pequeñas, no son apropiadas para redes grandes donde alguien quiere ponerse en contacto con un par en particular. Esto no quiere decir que este sistema no tenga ningún valor, sólo que su aplicación está limitada a situaciones donde sus problemas pueden evitarse."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo"
|
||||
" un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una "
|
||||
"herramienta de elusión</a>. No hace falta decir que el ser de código "
|
||||
"cerrado y orientada a un país específico no son buenas ideas. I2P es, por"
|
||||
" supuesto, de código libre. Aunque el código y nuestra <a "
|
||||
"href=\"%(docs)s\">documentación técnica</a> necesitan muchas más "
|
||||
"revisión."
|
||||
msgstr "Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una herramienta de elusión</a>. No hace falta decir que el ser de código cerrado y orientada a un país específico no son buenas ideas. I2P es, por supuesto, de código libre. Aunque el código y nuestra <a href=\"%(docs)s\">documentación técnica</a> necesitan muchas más revisión."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -412,10 +231,8 @@ msgstr "Servicios VPN de pago"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo ticket"
|
||||
" en el Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
msgid "Others"
|
||||
@ -443,17 +260,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a"
|
||||
" la gente salir a través de su red ya mezclada de baja latencia. Las dos "
|
||||
"primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo "
|
||||
"relacionas con las diferencias en el modelo de amenazas y el diseño de "
|
||||
"los outproxies (a través de Tor soporta también servicios ocultos). "
|
||||
"Además, Tor usa un enfoque basado en directorios - creando un punto "
|
||||
"central para manejar la 'vista' general de las redes, y además se "
|
||||
"obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base"
|
||||
" de datos de la red </a> dsitribuida de I2P y la <a "
|
||||
"href=\"%(peerselection)s\">selección de pares</a>."
|
||||
msgstr "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a la gente salir a través de su red ya mezclada de baja latencia. Las dos primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo relacionas con las diferencias en el modelo de amenazas y el diseño de los outproxies (a través de Tor soporta también servicios ocultos). Además, Tor usa un enfoque basado en directorios - creando un punto central para manejar la 'vista' general de las redes, y además se obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base de datos de la red </a> dsitribuida de I2P y la <a href=\"%(peerselection)s\">selección de pares</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -466,13 +273,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de "
|
||||
"ataques - una vez que la comunicación deja la red Tor, adversarios "
|
||||
"pasivos pueden hacer más fácilmente ataques de análisis. Además los "
|
||||
"outproxies tienen acceso al texto en claro transferido en las dos "
|
||||
"direcciones, y los outproxies son propensos a abusos, y además tenemos "
|
||||
"que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
msgstr "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de ataques - una vez que la comunicación deja la red Tor, adversarios pasivos pueden hacer más fácilmente ataques de análisis. Además los outproxies tienen acceso al texto en claro transferido en las dos direcciones, y los outproxies son propensos a abusos, y además tenemos que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -482,12 +283,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Aún así, mucha gente no tiene por que preocuparse por estas situaciones, "
|
||||
"ya que no están dentro del modelo de amenazas. Y además esto está fuera "
|
||||
"del alcance (formal) de I2P (si la gente desea construir un outproxy "
|
||||
"sobre la capa de comunicación anónima, pueden hacerlo). De hecho, "
|
||||
"actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
msgstr "Aún así, mucha gente no tiene por que preocuparse por estas situaciones, ya que no están dentro del modelo de amenazas. Y además esto está fuera del alcance (formal) de I2P (si la gente desea construir un outproxy sobre la capa de comunicación anónima, pueden hacerlo). De hecho, actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -497,9 +293,7 @@ msgstr "Comparación de la terminología de I2P y Tor"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Mientras que Tor e I2p tienen algunas similitudes, mucha de la "
|
||||
"terminología cambia."
|
||||
msgstr "Mientras que Tor e I2p tienen algunas similitudes, mucha de la terminología cambia."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -572,8 +366,8 @@ msgstr "Servicio oculto"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite o destinación"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -623,9 +417,7 @@ msgstr "Punto de reunión"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:70
|
||||
msgid "somewhat like Inbound Gateway + Outbound Endpoint"
|
||||
msgstr ""
|
||||
"algo así como inbound Gateway + Outbound Endpoint, puerta de salida de "
|
||||
"entrada + punto final de salida"
|
||||
msgstr "algo así como inbound Gateway + Outbound Endpoint, puerta de salida de entrada + punto final de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:71
|
||||
msgid "Router Descriptor"
|
||||
@ -645,15 +437,10 @@ msgstr "Beneficios de Tor sobre I2p"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"El número de usuarios es mucho mayor; mucho más visible en entorno "
|
||||
"académicos y comunidades de hackers; tiene los beneficios de tener "
|
||||
"estudios formales sobre el anonimato, resistencia y rendimiento; y tienen"
|
||||
" un líder no anónimo universitario y visible"
|
||||
msgstr "El número de usuarios es mucho mayor; mucho más visible en entorno académicos y comunidades de hackers; tiene los beneficios de tener estudios formales sobre el anonimato, resistencia y rendimiento; y tienen un líder no anónimo universitario y visible"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -669,32 +456,24 @@ msgstr "Tiene más desarrolladores, incluso algunos con fondos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Tiene un bloqueo de nivel de estado más resistente debido la capa de "
|
||||
"transporte TLS y a los puentes (I2P tienen propuestas de \"rutas "
|
||||
"completamente restringidas\" pero estas aún no están implementadas)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Tiene un bloqueo de nivel de estado más resistente debido la capa de transporte TLS y a los puentes (I2P tienen propuestas de \"rutas completamente restringidas\" pero estas aún no están implementadas)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar el tráfico de salida, con un gran número de nodos"
|
||||
" de salida"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Diseñado para optimizar el tráfico de salida, con un gran número de nodos de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Mejor documentación, tiene estudios formales y especificaciones, una web "
|
||||
"mejor, y muchas traducciones"
|
||||
msgstr "Mejor documentación, tiene estudios formales y especificaciones, una web mejor, y muchas traducciones"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -708,17 +487,13 @@ msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada"
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"El control centralizado reduce la complejidad de cada nodo y puede evitar"
|
||||
" ataques Sybil fácilmente"
|
||||
msgstr "El control centralizado reduce la complejidad de cada nodo y puede evitar ataques Sybil fácilmente"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y "
|
||||
"menor latencia"
|
||||
msgstr "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y menor latencia"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -730,11 +505,9 @@ msgstr "Beneficios de I2P sobre Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar los servicios ocultos, que son mucho más rápidos "
|
||||
"que los de Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos que los de Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -744,17 +517,13 @@ msgstr "Totalmente distribuido y auto organizado"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Los pares son seleccionados continuamente según el rendimiento y "
|
||||
"categoría, en vez de confiar en la capacidad indicada"
|
||||
msgstr "Los pares son seleccionados continuamente según el rendimiento y categoría, en vez de confiar en la capacidad indicada"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Los pares Floodfill (\"servidores de directorios\") cambian, en vez de "
|
||||
"estar siempre fijos."
|
||||
msgstr "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de estar siempre fijos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@ -772,17 +541,13 @@ msgstr "Conmutado por paquete en vez de conmutado por circuito"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"Implica control de carga transparente de los mensajes a través de "
|
||||
"múltiples pares, en vez de por un sólo camino."
|
||||
msgstr "Implica control de carga transparente de los mensajes a través de múltiples pares, en vez de por un sólo camino."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"Resistencia contra fallos ya que usa varios túneles en paralelo, además "
|
||||
"de rotar los túneles"
|
||||
msgstr "Resistencia contra fallos ya que usa varios túneles en paralelo, además de rotar los túneles"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -790,20 +555,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por "
|
||||
"ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los "
|
||||
"pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
msgstr "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Túneles unidireccionales en vez de circuitos bidireccionales, usando el "
|
||||
"doble de nodos un par se compromete más para obtener la misma "
|
||||
"información."
|
||||
msgstr "Túneles unidireccionales en vez de circuitos bidireccionales, usando el doble de nodos un par se compromete más para obtener la misma información."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -817,11 +576,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protección contra la detección de la actividad de un cliente, incluso "
|
||||
"cuando un atacante participa en el túnel, ya que los túneles no son sólo "
|
||||
"usados para pasar el mensaje de punto a punto (por ejemplo, netDB, "
|
||||
"administración de túneles, pruebas en los túneles)"
|
||||
msgstr "Protección contra la detección de la actividad de un cliente, incluso cuando un atacante participa en el túnel, ya que los túneles no son sólo usados para pasar el mensaje de punto a punto (por ejemplo, netDB, administración de túneles, pruebas en los túneles)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -829,19 +584,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Los túneles de I2P tienen una vida corta, reduciendo el número de "
|
||||
"muestras que un atacante puede usar para lograr un ataque activo, al "
|
||||
"contrario que con los circuitos en Tor, que son típicamente de larga "
|
||||
"duración."
|
||||
msgstr "Los túneles de I2P tienen una vida corta, reduciendo el número de muestras que un atacante puede usar para lograr un ataque activo, al contrario que con los circuitos en Tor, que son típicamente de larga duración."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"Los APIs de I2P están específicamente diseñados para el anonimato y la "
|
||||
"seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
msgstr "Los APIs de I2P están específicamente diseñados para el anonimato y la seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -852,10 +601,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"El uso de ancho de banda de cualquier par completo es bajo, mientras que "
|
||||
"en Tor, aunque un nodo cliente no necesita mucho ancho de banda, "
|
||||
"realmente no participan completamente en la red."
|
||||
msgstr "El uso de ancho de banda de cualquier par completo es bajo, mientras que en Tor, aunque un nodo cliente no necesita mucho ancho de banda, realmente no participan completamente en la red."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -875,26 +621,20 @@ msgstr "Otros beneficios potenciales de I2P aún no implementados"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente"
|
||||
" con ellos!"
|
||||
msgstr "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente con ellos!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Defensa contra el análisis de conteo de mensajes envolviendo múltiples "
|
||||
"mensajes dentro de la red garlic"
|
||||
msgstr "Defensa contra el análisis de conteo de mensajes envolviendo múltiples mensajes dentro de la red garlic"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Defensa contra la intersección a largo plazo añadiendo demoras en varios "
|
||||
"saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
msgstr "Defensa contra la intersección a largo plazo añadiendo demoras en varios saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -902,8 +642,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando "
|
||||
"túneles que manejarán 500 mensajes al minuto, donde el punto final "
|
||||
"inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
||||
msgstr "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando túneles que manejarán 500 mensajes al minuto, donde el punto final inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
@ -4558,7 +4558,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:72
|
||||
msgid "for"
|
||||
msgstr ""
|
||||
msgstr "para"
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:74
|
||||
msgid "in order to obscure your local time zone."
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -4547,7 +4547,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:72
|
||||
msgid "for"
|
||||
msgstr ""
|
||||
msgstr "para"
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:74
|
||||
msgid "in order to obscure your local time zone."
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,28 +1,30 @@
|
||||
# French translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# bassmax, 2015
|
||||
# AO <ao@localizationlab.org>, 2018-2020
|
||||
# Boxoa590, 2013
|
||||
# AO <ao@localizationlab.org>, 2017-2018
|
||||
# magma <magma@mail.i2p>, 2011
|
||||
# Boxoa590, 2013
|
||||
# syl_, 2013,2015-2016
|
||||
# Towinet, 2013-2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2020-04-03 21:47+0000\n"
|
||||
"Last-Translator: AO <ao@localizationlab.org>\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n"
|
||||
"Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: fr\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -30,89 +32,39 @@ msgstr "I2P comparé à Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet est entièrement distribué, c’est un réseau pair à pair de "
|
||||
"publication anonyme, offrant\n"
|
||||
"des moyens sûrs pour stocker des données, ainsi que des approches qui "
|
||||
"tentent de répondre aux charges\n"
|
||||
"d’une crue éclair. Alors que Freenet est conçu comme un magasin de "
|
||||
"données distribuées, des gens ont\n"
|
||||
"construit des applications par dessus celui-ci afin de faire de la "
|
||||
"communication anonyme plus générique, tels\n"
|
||||
"que des sites web statiques et des forums électroniques."
|
||||
msgstr "Freenet est entièrement distribué, c’est un réseau pair à pair de publication anonyme, offrant\ndes moyens sûrs pour stocker des données, ainsi que des approches qui tentent de répondre aux charges\nd’une crue éclair. Alors que Freenet est conçu comme un magasin de données distribuées, des gens ont\nconstruit des applications par dessus celui-ci afin de faire de la communication anonyme plus générique, tels\nque des sites Web statiques et des forums électroniques."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparé à I2P, Freenet offre des avantages considérables : c’est un "
|
||||
"magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet "
|
||||
"de récupérer les contenus publiés par autrui, même si l’éditeur n’est "
|
||||
"plus en ligne. En outre, il devrait être en mesure de distribuer des "
|
||||
"données populaires assez efficacement. I2P même n’offre et n’offrira pas "
|
||||
"cette fonction. D’autre part, il existe un chevauchement pour les "
|
||||
"utilisateurs qui veulent simplement communiquer anonymement les uns avec "
|
||||
"les autres par les sites Web, les forums, les logiciels de partage de "
|
||||
"fichiers, etc. Il y a aussi eu des tentatives de développement d’un "
|
||||
"magasin de données distribuées qui fonctionnerait par-dessus I2P (plus "
|
||||
"récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien "
|
||||
"n’est encore prêt pour une utilisation générale."
|
||||
msgstr "Comparé à I2P, Freenet offre des avantages considérables : c’est un magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet de récupérer les contenus publiés par autrui, même si l’éditeur n’est plus en ligne. En outre, il devrait être en mesure de distribuer des données populaires assez efficacement. I2P même n’offre et n’offrira pas cette fonction. D’autre part, il existe un chevauchement pour les utilisateurs qui veulent simplement communiquer anonymement les uns avec les autres par les sites Web, les forums, les logiciels de partage de fichiers, etc. Il y a aussi eu des tentatives de développement d’un magasin de données distribuées qui fonctionnerait par-dessus I2P (plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien n’est encore prêt pour une utilisation générale."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Cependant, même sans tenir compte des questions relatives aux mises en "
|
||||
"œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois"
|
||||
" sur l’évolutivité et la perspective d’anonymat, en raison en grande "
|
||||
"partie du mode de routage de Freenet, axé heuristique. Les interactions "
|
||||
"des différentes techniques peuvent certainement réussir à dissuader "
|
||||
"diverses attaques, et peut-être que certains aspects des algorithmes de "
|
||||
"routage peuvent faire espérer de l’évolutivité. Malheureusement, peu "
|
||||
"d’analyses des algorithmes concernés ont abouti à des résultats positifs,"
|
||||
" mais il reste encore de l’espoir. À tout le moins, Freenet fournit un "
|
||||
"anonymat substantiel contre un assaillant qui n’aurait pas les ressources"
|
||||
" nécessaires pour l’analyser davantage."
|
||||
msgstr "Cependant, même sans tenir compte des questions relatives aux mises en œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois sur l’évolutivité et la perspective d’anonymat, en raison en grande partie du mode de routage de Freenet, axé heuristique. Les interactions des différentes techniques peuvent certainement réussir à dissuader diverses attaques, et peut-être que certains aspects des algorithmes de routage peuvent faire espérer de l’évolutivité. Malheureusement, peu d’analyses des algorithmes concernés ont abouti à des résultats positifs, mais il reste encore de l’espoir. À tout le moins, Freenet fournit un anonymat substantiel contre un assaillant qui n’aurait pas les ressources nécessaires pour l’analyser davantage."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -120,49 +72,28 @@ msgstr "I2P comparé à d’autres projets"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Il existe un grand nombre d’autres applications et de projets travaillant"
|
||||
" sur les communications anonymes et I2P s’en est largement inspiré. Cette"
|
||||
" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a "
|
||||
"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a> de Freehaven\n"
|
||||
"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à "
|
||||
"GNUnet servent à celà). \n"
|
||||
"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les "
|
||||
"suivants disposent d’ailleurs d’une page dédiée :"
|
||||
msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Ceux qui suivent sont discuté sur la page <a "
|
||||
"href=\"%(othernetworks)s\">autres réseaux</a>"
|
||||
msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Le contenu de cette page est soumis à mises à jour, discussions et "
|
||||
"conflits, et nous accueillons avec plaisir les commentaires et ajouts.\n"
|
||||
"Vous pouvez nous faire part de votre analyse en saisissant un <a "
|
||||
"href=\"%(trac)s\">nouveau ticket dans Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -179,247 +110,116 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"La plupart des sections suivantes sont assez vieilles et peuvent ne pas "
|
||||
"être précises.\n"
|
||||
"Pour une vue d’ensemble des comparaisons disponibles, voir la\n"
|
||||
"<a href=\"%(comparison)s\">page de comparaisons réseau principale</a>.\n"
|
||||
"Vous pouvez également nous faire part de votre analyse en créant un\n"
|
||||
"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix et Tarzan sont tous les deux des réseaux pair à pair de "
|
||||
"mandataires d’anonymisation entièrement distribués, permettant aux "
|
||||
"utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à "
|
||||
"latence faible. Morphmix comportent des algorithmes très intéressants de "
|
||||
"détection de collusion et des défenses contre les Sybil, tandis que "
|
||||
"Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose."
|
||||
" Les deux principales différences entre ces systèmes et I2P sont liées au"
|
||||
" <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur "
|
||||
"conception de mandataire sortant (au lieu de fournir de l’anonymat à la "
|
||||
"fois à l’émetteur et au destinataire). Le code source est offert pour les"
|
||||
" deux systèmes, mais nous ne sommes pas au courant d’une utilisation en "
|
||||
"dehors des milieux universitaires."
|
||||
msgstr "Morphmix et Tarzan sont tous les deux des réseaux pair à pair de mandataires d’anonymisation entièrement distribués, permettant aux utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à latence faible. Morphmix comportent des algorithmes très intéressants de détection de collusion et des défenses contre les Sybil, tandis que Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose. Les deux principales différences entre ces systèmes et I2P sont liées au <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur conception de mandataire sortant (au lieu de fournir de l’anonymat à la fois à l’émetteur et au destinataire). Le code source est offert pour les deux systèmes, mais nous ne sommes pas au courant d’une utilisation en dehors des milieux universitaires."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion et Mixmaster sont des réseaux pour offrir un système de "
|
||||
"courriel anonyme contre des adversaires très puissants.\n"
|
||||
"Les applications de messagerie à latence élevée fonctionnant sur I2P (par"
|
||||
" exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se "
|
||||
"révéler adéquates pour répondre au modèle de menace de ces adversaires, "
|
||||
"en s’exécutant simultanément aux besoins des utilisateurs à latence "
|
||||
"faible, pour fournir un jeu d’anonymat considérablement plus important.\n"
|
||||
"La prise en charge d’une latence élevée dans le routeur I2P même pourrait"
|
||||
" ou pas être ajoutée dans une version future éloignée.\n"
|
||||
"Il est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs "
|
||||
"exigeant une protection extrême pour le courriel."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion et Mixmaster sont des réseaux pour offrir un système de courriel anonyme contre des adversaires très puissants.\nLes applications de messagerie à latence élevée fonctionnant sur I2P (par exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se révéler adéquates pour répondre au modèle de menace de ces adversaires, en s’exécutant simultanément aux besoins des utilisateurs à latence faible, pour fournir un jeu d’anonymat considérablement plus important.\nLa prise en charge d’une latence élevée dans le routeur I2P même pourrait ou pas être ajoutée dans une version future éloignée.\nIl est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs exigeant une protection extrême pour le courriel."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée"
|
||||
" sur un répertoire."
|
||||
msgstr "Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée sur un répertoire."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour "
|
||||
"l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés"
|
||||
" (participants à la cascade) qui brassent et mélangent les requêtes des "
|
||||
"clients à travers la séquence de nœuds (la cascade) avant de les relayer "
|
||||
"vers le Toile par un mandataire. Le champ d’application, le modèle de "
|
||||
"menace et la sécurité sont sensiblement\n"
|
||||
"différents d’I2P, mais pour ceux qui n’exige pas un anonymat important, "
|
||||
"mais qui ne sont quand même pas satisfaits par un service genre "
|
||||
"Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute "
|
||||
"personne relevant de la juridiction des tribunaux allemands, car le "
|
||||
"bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec "
|
||||
"succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la"
|
||||
" méthode de cette attaque a ensuite été jugée illégale par les tribunaux "
|
||||
"allemands, le fait que les données ont été recueillies avec succès est "
|
||||
"une préoccupation. Les tribunaux changent d’avis selon les circonstances "
|
||||
"et c’est la preuve que si un organisme gouvernemental ou une agence de "
|
||||
"renseignement le voulaient, ils pourraient recueillir les données, même "
|
||||
"si cela peut être déclaré irrecevable ultérieurement par certains "
|
||||
"tribunaux)"
|
||||
msgstr "JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés (participants à la cascade) qui brassent et mélangent les requêtes des clients à travers la séquence de nœuds (la cascade) avant de les relayer vers le Toile par un mandataire. Le champ d’application, le modèle de menace et la sécurité sont sensiblement\ndifférents d’I2P, mais pour ceux qui n’exige pas un anonymat important, mais qui ne sont quand même pas satisfaits par un service genre Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute personne relevant de la juridiction des tribunaux allemands, car le bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la méthode de cette attaque a ensuite été jugée illégale par les tribunaux allemands, le fait que les données ont été recueillies avec succès est une préoccupation. Les tribunaux changent d’avis selon les circonstances et c’est la preuve que si un organisme gouvernemental ou une agence de renseignement le voulaient, ils pourraient recueillir les données, même si cela peut être déclaré irrecevable ultérieurement par certains tribunaux)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Ces deux systèmes fonctionnent par le même routage <a "
|
||||
"href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré "
|
||||
"d’anonymat d’après un modèle de menace qui consiste à fournir un déni "
|
||||
"plausible contre un adversaire seul. Avec le routage d’antnet, soit ils "
|
||||
"appliquent d’abord un cheminement aléatoire, soit une recherche par "
|
||||
"diffusion pour trouver un pair ayant les données ou l’identité désirée. "
|
||||
"Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce "
|
||||
"chemin trouvé. Cela fonctionne bien pour les applications qui veulent "
|
||||
"simplement savoir ce que les autres aux alentours ont à offrir. « Comment"
|
||||
" allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». "
|
||||
"Vous obtenez essentiellement une grappe locale de nœuds qui peuvent "
|
||||
"partager des fichiers et garder un certain niveau d’anonymat (quoique "
|
||||
"vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de "
|
||||
"pairs)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Ces deux systèmes fonctionnent par le même routage <a href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré d’anonymat d’après un modèle de menace qui consiste à fournir un déni plausible contre un adversaire seul. Avec le routage d’antnet, soit ils appliquent d’abord un cheminement aléatoire, soit une recherche par diffusion pour trouver un pair ayant les données ou l’identité désirée. Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce chemin trouvé. Cela fonctionne bien pour les applications qui veulent simplement savoir ce que les autres aux alentours ont à offrir. « Comment allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». Vous obtenez essentiellement une grappe locale de nœuds qui peuvent partager des fichiers et garder un certain niveau d’anonymat (quoique vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de pairs)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du "
|
||||
"tout - si l’application veut parler avec un\n"
|
||||
"pair en particulier cela finit par faire une large recherche (broadcast) "
|
||||
"ou une promenade aléatoire (random walk) (quoique s’ils ont assez\n"
|
||||
"de chance pour que cela réussisse, le routage antnet devrait optimiser "
|
||||
"cette connexion trouvée). Cela signifie que\n"
|
||||
"tandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne"
|
||||
" sont pas appropriés pour de grands réseaux où\n"
|
||||
"quelqu’un veut se mettre en contact avec un autre pair spécifique. Cela "
|
||||
"ne signifie pas qu’il n’y a pas\n"
|
||||
"de valeur dans ces systèmes, juste que leur applicabilité est limitée aux"
|
||||
" situations où leur\n"
|
||||
"problèmes (issues) particuliers peuvent être adressés."
|
||||
msgstr "Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du tout - si l’application veut parler avec un\npair en particulier cela finit par faire une large recherche (broadcast) ou une promenade aléatoire (random walk) (quoique s’ils ont assez\nde chance pour que cela réussisse, le routage antnet devrait optimiser cette connexion trouvée). Cela signifie que\ntandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne sont pas appropriés pour de grands réseaux où\nquelqu’un veut se mettre en contact avec un autre pair spécifique. Cela ne signifie pas qu’il n’y a pas\nde valeur dans ces systèmes, juste que leur applicabilité est limitée aux situations où leur\nproblèmes (issues) particuliers peuvent être adressés."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"C’était un réseau closed-source visant les utilisateurs iraniens.\n"
|
||||
"Tor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on "
|
||||
"doit chercher dans un outil de mise en échec</a>.\n"
|
||||
"Suffit-il de dire que être closed-source et cibler publiquement un pays "
|
||||
"spécifique ne sont pas de bonnes idées.\n"
|
||||
"I2P est, bien sûr, open-source. Cependant, ce code source, et notre\n"
|
||||
"<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup "
|
||||
"plus d’examen."
|
||||
msgstr "C’était un réseau closed-source visant les utilisateurs iraniens.\nTor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on doit chercher dans un outil de mise en échec</a>.\nSuffit-il de dire que être closed-source et cibler publiquement un pays spécifique ne sont pas de bonnes idées.\nI2P est, bien sûr, open-source. Cependant, ce code source, et notre\n<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup plus d’examen."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -430,10 +230,8 @@ msgstr "Services RPV payants"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Vous pouvez contribuer par votre analyse en saisissant un\n"
|
||||
"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
msgid "Others"
|
||||
@ -461,18 +259,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor et le routage en oignon sont tous deux des réseaux mandataires "
|
||||
"d’anonymisation, permettant aux gens de tunnelliser par leur réseau de "
|
||||
"mélange à latence faible. Les deux principales différences entre Tor, le "
|
||||
"routage en oignon et I2P sont, encore une fois, liées à des différences "
|
||||
"dans le modèle de menaces et la conception du mandataire sortant (bien "
|
||||
"que Tor prenne aussi en charge les services cachés). De plus, Tor\n"
|
||||
"utilise une approche basée sur un annuaire, fournissant un point "
|
||||
"centralisé de gestion de la « vue » d’ensemble du réseau, recueille et "
|
||||
"rapporte aussi des statistiques, contrairement à la <a "
|
||||
"href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la "
|
||||
"<a href=\"%(peerselection)s\">sélection de pairs</a>."
|
||||
msgstr "Tor et le routage en oignon sont tous deux des réseaux mandataires d’anonymisation, permettant aux gens de tunnelliser par leur réseau de mélange à latence faible. Les deux principales différences entre Tor, le routage en oignon et I2P sont, encore une fois, liées à des différences dans le modèle de menaces et la conception du mandataire sortant (bien que Tor prenne aussi en charge les services cachés). De plus, Tor\nutilise une approche basée sur un annuaire, fournissant un point centralisé de gestion de la « vue » d’ensemble du réseau, recueille et rapporte aussi des statistiques, contrairement à la <a href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la <a href=\"%(peerselection)s\">sélection de pairs</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -485,15 +272,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"La fonction de mandataire sortant d’I2P/Tor présente quelques\n"
|
||||
"faiblesses importantes contre certains assaillants. Une fois que la "
|
||||
"communication quitte le réseau de mélange, les adversaires\n"
|
||||
"passifs de partout peuvent plus facilement mettre en place une analyse du"
|
||||
" trafic. De plus, les mandataires sortants ont accès aux données en clair"
|
||||
" transférées dans les deux sens, et les mandataires sortants sont sujets "
|
||||
"aux abus, en plus de tous les autres problèmes de sécurité inhérents au "
|
||||
"trafic normal d’Internet, que nous avons appris à connaître et à aimer."
|
||||
msgstr "La fonction de mandataire sortant d’I2P/Tor présente quelques\nfaiblesses importantes contre certains assaillants. Une fois que la communication quitte le réseau de mélange, les adversaires\npassifs de partout peuvent plus facilement mettre en place une analyse du trafic. De plus, les mandataires sortants ont accès aux données en clair transférées dans les deux sens, et les mandataires sortants sont sujets aux abus, en plus de tous les autres problèmes de sécurité inhérents au trafic normal d’Internet, que nous avons appris à connaître et à aimer."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -503,14 +282,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Cependant, la plupart des gens ne doivent pas s’inquiéter de\n"
|
||||
"ces situations, car elles ne correspondent pas à leur modèle de menace. "
|
||||
"Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si "
|
||||
"des personnes veulent construire une fonction de mandataire sortant par-"
|
||||
"dessus une couche de communication anonyme, elles le peuvent). En fait, "
|
||||
"certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire "
|
||||
"sortant."
|
||||
msgstr "Cependant, la plupart des gens ne doivent pas s’inquiéter de\nces situations, car elles ne correspondent pas à leur modèle de menace. Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si des personnes veulent construire une fonction de mandataire sortant par-dessus une couche de communication anonyme, elles le peuvent). En fait, certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire sortant."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -520,9 +292,7 @@ msgstr "Comparaison de terminologie entre Tor et I2P"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Alors que Tor et I2P sont similaires à bien des égards, une grande partie"
|
||||
" de la terminologie est différente."
|
||||
msgstr "Alors que Tor et I2P sont similaires à bien des égards, une grande partie de la terminologie est différente."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -595,8 +365,8 @@ msgstr "Service caché"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite ou Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -666,21 +436,14 @@ msgstr "Avantages de Tor sur I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les "
|
||||
"communautés universitaires et hackers ; bénéficie\n"
|
||||
"d’études formelles d’anonymat, de résistance, et de performance ;\n"
|
||||
"a un chef de file universitaire non-anonyme, visible"
|
||||
msgstr "Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les communautés universitaires et hackers ; bénéficie\nd’études formelles d’anonymat, de résistance, et de performance ;\na un chef de file universitaire non-anonyme, visible"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr ""
|
||||
"A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à "
|
||||
"aborder"
|
||||
msgstr "A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à aborder"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:85
|
||||
msgid "Has significant funding"
|
||||
@ -692,33 +455,24 @@ msgstr "À plus de développeurs, dont plusieurs sont financés"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Plus résistant au blocage au niveau d’un État en raison de la couche "
|
||||
"transport TLS et des ponts\n"
|
||||
"(I2P a des propositions pour des \"routes restreintes pleines\" mais "
|
||||
"celles-ci ne sont pas encore mises en œuvre)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Plus résistant au blocage au niveau d’un État en raison de la couche transport TLS et des ponts\n(I2P a des propositions pour des \"routes restreintes pleines\" mais celles-ci ne sont pas encore mises en œuvre)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Assez grand pour avoir dû s’adapter aux tentatives de blocage et de DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds "
|
||||
"de sortie"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds de sortie"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Une meilleure documentation avec des articles et des spécifications "
|
||||
"formelles, un meilleur site Web, beaucoup plus de traductions"
|
||||
msgstr "Une meilleure documentation avec des articles et des spécifications formelles, un meilleur site Web, beaucoup plus de traductions"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -732,17 +486,13 @@ msgstr "Les nœuds client de Tor ont une très faible surcharge de la bande pass
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Le contrôle centralisé réduit la complexité à chaque\n"
|
||||
"nœud et peut répondre efficacement à des attaques Sybil"
|
||||
msgstr "Le contrôle centralisé réduit la complexité à chaque\nnœud et peut répondre efficacement à des attaques Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Un coeur de nœuds à grande capacité a la possibilité de fournir un\n"
|
||||
"plus haut débit tout en gardant une faible latence"
|
||||
msgstr "Un coeur de nœuds à grande capacité a la possibilité de fournir un\nplus haut débit tout en gardant une faible latence"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -754,11 +504,9 @@ msgstr "Avantages d’I2P sur Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide"
|
||||
" que dans Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide que dans Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -768,25 +516,17 @@ msgstr "Entièrement distribué et auto-organisé"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Les pairs sont choisis par profilage continu et par classement de leurs "
|
||||
"performances,\n"
|
||||
"plutôt que de se contenter de faire confiance à la capacité qu’ils "
|
||||
"revendiquent"
|
||||
msgstr "Les pairs sont choisis par profilage continu et par classement de leurs performances,\nplutôt que de se contenter de faire confiance à la capacité qu’ils revendiquent"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne"
|
||||
" sont pas fiables, plutôt que figés dans le code"
|
||||
msgstr "Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne sont pas fiables, plutôt que figés dans le code"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas "
|
||||
"du tout"
|
||||
msgstr "Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas du tout"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -800,17 +540,13 @@ msgstr "Commutation de paquets à la place de commutation de circuit"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"équilibrage de charge transparent et implicite des messages\n"
|
||||
"à travers plusieurs pairs, plutôt que par un seul chemin"
|
||||
msgstr "équilibrage de charge transparent et implicite des messages\nà travers plusieurs pairs, plutôt que par un seul chemin"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"résistance contre les défaillances, ceci par exécution de plusieurs\n"
|
||||
"tunnels en parallèle, ainsi que par rotation des tunnels"
|
||||
msgstr "résistance contre les défaillances, ceci par exécution de plusieurs\ntunnels en parallèle, ainsi que par rotation des tunnels"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -818,21 +554,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\n"
|
||||
"de O(N) (Alice a par exemple 2 tunnels entrants qui sont\n"
|
||||
"utilisés par tous les pairs avec lesquels parle Alice,\n"
|
||||
"plutôt qu’un circuit pour chaque)"
|
||||
msgstr "s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\nde O(N) (Alice a par exemple 2 tunnels entrants qui sont\nutilisés par tous les pairs avec lesquels parle Alice,\nplutôt qu’un circuit pour chaque)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Tunnels unidirectionnels au lieu de circuits\n"
|
||||
"bidirectionnel, doublant le nombre de nœuds qu’un\n"
|
||||
"pair doit avoir à compromettre pour obtenir la même information."
|
||||
msgstr "Tunnels unidirectionnels au lieu de circuits\nbidirectionnel, doublant le nombre de nœuds qu’un\npair doit avoir à compromettre pour obtenir la même information."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -846,11 +575,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protection contre la détection de l’activité du client, même si un "
|
||||
"assaillant participe au tunnel, puisque les tunnels ne sont pas juste "
|
||||
"utilisés pour passer simplement des messages de bout en bout (p. ex. "
|
||||
"BDréseau, gestion de tunnels, test de tunnels)"
|
||||
msgstr "Protection contre la détection de l’activité du client, même si un assaillant participe au tunnel, puisque les tunnels ne sont pas juste utilisés pour passer simplement des messages de bout en bout (p. ex. BDréseau, gestion de tunnels, test de tunnels)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -858,19 +583,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le "
|
||||
"nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\n"
|
||||
"attaque active, contrairement aux circuits dans Tor, qui ont généralement"
|
||||
" une durée de vie longue."
|
||||
msgstr "Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\nattaque active, contrairement aux circuits dans Tor, qui ont généralement une durée de vie longue."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité,"
|
||||
" tandis que SOCKS est conçu pour la fonctionnalité."
|
||||
msgstr "Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité, tandis que SOCKS est conçu pour la fonctionnalité."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -881,11 +600,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"Être un pair à part entière ne présente qu’une faible surcharge de bande "
|
||||
"passante, alors que dans Tor, bien que les nœuds client n’exigent que peu"
|
||||
" de bande passante, ils ne participent pas complètement au réseau de "
|
||||
"mélange."
|
||||
msgstr "Être un pair à part entière ne présente qu’une faible surcharge de bande passante, alors que dans Tor, bien que les nœuds client n’exigent que peu de bande passante, ils ne participent pas complètement au réseau de mélange."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -905,27 +620,20 @@ msgstr "Autres avantages potentiels d’I2P, mais pas encore mis en œuvre"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur"
|
||||
" eux !"
|
||||
msgstr "… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur eux !"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Défense contre l’analyse du nombre de messages par enveloppement en ail\n"
|
||||
"de plusieurs messages"
|
||||
msgstr "Défense contre l’analyse du nombre de messages par enveloppement en ail\nde plusieurs messages"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Défense contre intersection long terme en ajoutant des retards\n"
|
||||
"à différents sauts (où les retards ne sont pas discernables\n"
|
||||
"par d’autres sauts)"
|
||||
msgstr "Défense contre intersection long terme en ajoutant des retards\nà différents sauts (où les retards ne sont pas discernables\npar d’autres sauts)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -933,9 +641,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Diverses stratégies de mélange au niveau du tunnel (par exemple\n"
|
||||
"créer un tunnel qui va gérer 500 messages / minute,\n"
|
||||
"dans lequel le point final va injecter des messages factices si\n"
|
||||
"il y a une nombre de messages insuffisant, etc)"
|
||||
|
||||
msgstr "Diverses stratégies de mélange au niveau du tunnel (par exemple\ncréer un tunnel qui va gérer 500 messages / minute,\ndans lequel le point final va injecter des messages factices si\nil y a une nombre de messages insuffisant, etc)"
|
||||
|
@ -4556,7 +4556,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:72
|
||||
msgid "for"
|
||||
msgstr ""
|
||||
msgstr "pour"
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:74
|
||||
msgid "in order to obscure your local time zone."
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# French translations for I2P.
|
||||
# Copyright (C) 2019 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# AO <ao@localizationlab.org>, 2017
|
||||
# Boxoa590, 2013
|
||||
@ -11,17 +11,18 @@
|
||||
# Towinet, 2013-2014,2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-06-24 13:48+0000\n"
|
||||
"PO-Revision-Date: 2019-04-25 20:10+0000\n"
|
||||
"Last-Translator: AO <ao@localizationlab.org>\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: AO <ao@localizationlab.org>, 2017\n"
|
||||
"Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: fr\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -42,16 +43,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -59,48 +55,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Il y a une large communauté de recherche examinant une vaste gamme des "
|
||||
"aspects de\n"
|
||||
"l’anonymat. Pour une liste actuelle et compréhensive des papiers "
|
||||
"pertinents, voir la\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P bénéficie d’une grande partie de la recherche faite dans Tor et le "
|
||||
"routage en oignon, mais il y a\n"
|
||||
"peu d’intérêt en recherche consacrée à la théorie derrière I2P, et les "
|
||||
"choix\n"
|
||||
"et différences que le réseau fait. Cela présente une occasion unique pour"
|
||||
" \n"
|
||||
"de la recherche originale.\n"
|
||||
msgstr "\nIl y a une large communauté de recherche examinant une vaste gamme des aspects de\nl’anonymat. Pour une liste actuelle et compréhensive des papiers pertinents, voir la\n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P bénéficie d’une grande partie de la recherche faite dans Tor et le routage en oignon, mais il y a\npeu d’intérêt en recherche consacrée à la théorie derrière I2P, et les choix\net différences que le réseau fait. Cela présente une occasion unique pour \nde la recherche originale.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Une liste des articles publiés connus sur I2P est proposée <a "
|
||||
"href=\"%(papers)s\">ici</a>."
|
||||
msgstr "Une liste des articles publiés connus sur I2P est proposée <a href=\"%(papers)s\">ici</a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -114,16 +89,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -134,27 +105,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -170,13 +131,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -184,10 +143,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -195,10 +152,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -210,32 +165,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -246,13 +193,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -262,35 +206,23 @@ msgstr "Configuration d’une famille de routeurs"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -342,59 +274,67 @@ msgstr ""
|
||||
msgid "Vulnerability Response Process"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:3
|
||||
msgid "January 2017"
|
||||
msgstr "Janvier 2017"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
msgid "Point of Contact for Security Issues"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:14
|
||||
#: i2p2www/pages/site/research/vrp.html:22
|
||||
msgid "Security Response Team"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:16
|
||||
msgid "Only the following members have access to the security point of contact:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:25
|
||||
msgid "Incident Response"
|
||||
#: i2p2www/pages/site/research/vrp.html:24
|
||||
msgid ""
|
||||
"Echelon is the trusted security point-of-contact. He forwards e-mails to "
|
||||
"team members as appropriate."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:28
|
||||
msgid "Researcher submits report via one or both of two methods:"
|
||||
msgid "Incident Response"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:32
|
||||
msgid "Email"
|
||||
msgstr "Courriel"
|
||||
#: i2p2www/pages/site/research/vrp.html:31
|
||||
msgid "Researcher submits report via:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:42
|
||||
#, python-format
|
||||
msgid ""
|
||||
"In no more than %(limit)s working days, Response Team should gratefully\n"
|
||||
"In no more than %(limit)s working days, Response Team should\n"
|
||||
"respond to researcher using only encrypted methods."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -414,369 +354,357 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"If over email, Response Manager opens a HackerOne issue for new "
|
||||
"submission."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:74
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Effects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:83
|
||||
msgid "Effects individual routers, or must be carefully exploited."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:87
|
||||
msgid "Is not easily exploitable."
|
||||
msgstr "N’est pas facilement exploitable."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#: i2p2www/pages/site/research/vrp.html:89
|
||||
msgid "Respond according to the severity of the vulnerability:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:97
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:102
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:109
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:113
|
||||
#: i2p2www/pages/site/research/vrp.html:109
|
||||
msgid "MEDIUM and HIGH severities will require a Point Release."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:116
|
||||
#: i2p2www/pages/site/research/vrp.html:112
|
||||
msgid "LOW severities will be addressed in the next Regular Release."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
#: i2p2www/pages/site/research/vrp.html:118
|
||||
msgid "Response Team applies appropriate patch(es)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:126
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work "
|
||||
"in."
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:129
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
msgid "Patches are reviewed with the researcher."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:136
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
msgid "Vulnerability announcement is drafted."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:140
|
||||
#: i2p2www/pages/site/research/vrp.html:136
|
||||
msgid "Include severity of vulnerability."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:143
|
||||
#: i2p2www/pages/site/research/vrp.html:139
|
||||
msgid "Include systems/apps effected."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:146
|
||||
#: i2p2www/pages/site/research/vrp.html:142
|
||||
msgid "Include solutions (if any) if patch cannot be applied."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:150
|
||||
#: i2p2www/pages/site/research/vrp.html:146
|
||||
msgid "Release date is discussed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
#: i2p2www/pages/site/research/vrp.html:152
|
||||
msgid ""
|
||||
"At release date, Response Team coordinates with developers to finalize "
|
||||
"update:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:160
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
msgid "Response Manager propagates the \"hotfix branch\" to trunk."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:163
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:166
|
||||
msgid "Proceed with the Point or Regular Release."
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:173
|
||||
#: i2p2www/pages/site/research/vrp.html:172
|
||||
msgid "Post-release Disclosure Process"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:176
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:180
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:184
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
msgid ""
|
||||
"Response Manager contacts researcher and asks if researcher wishes for "
|
||||
"credit."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:187
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:191
|
||||
#: i2p2www/pages/site/research/vrp.html:190
|
||||
msgid "Project name and URL."
|
||||
msgstr "Nom du projet et URL."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:194
|
||||
#: i2p2www/pages/site/research/vrp.html:193
|
||||
msgid "Versions known to be affected."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:197
|
||||
#: i2p2www/pages/site/research/vrp.html:196
|
||||
msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:200
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:203
|
||||
#: i2p2www/pages/site/research/vrp.html:202
|
||||
msgid "Type of vulnerability and its impact."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:206
|
||||
#: i2p2www/pages/site/research/vrp.html:205
|
||||
msgid "If already obtained or applicable, a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:209
|
||||
#: i2p2www/pages/site/research/vrp.html:208
|
||||
msgid "The planned, coordinated release date."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:212
|
||||
#: i2p2www/pages/site/research/vrp.html:211
|
||||
msgid ""
|
||||
"Mitigating factors (for example, the vulnerability is only exposed in "
|
||||
"uncommon, non-default configurations)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:215
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:218
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:223
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:226
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:234
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:246
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is *not* successfully "
|
||||
"completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:255
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:264
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:273
|
||||
#: i2p2www/pages/site/research/vrp.html:277
|
||||
msgid "Incident Analysis"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:276
|
||||
#: i2p2www/pages/site/research/vrp.html:280
|
||||
msgid "Isolate codebase"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:278
|
||||
#: i2p2www/pages/site/research/vrp.html:298
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
msgid "Problematic implementation of classes/libraries/functions, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:285
|
||||
#: i2p2www/pages/site/research/vrp.html:289
|
||||
msgid "Focus on apps/distro packaging, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:288
|
||||
#: i2p2www/pages/site/research/vrp.html:292
|
||||
msgid "Operator/config error, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:296
|
||||
#: i2p2www/pages/site/research/vrp.html:300
|
||||
msgid "Auditing"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
#: i2p2www/pages/site/research/vrp.html:306
|
||||
msgid "Auditing of problem area(s) as discussed in point 1."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:305
|
||||
#: i2p2www/pages/site/research/vrp.html:309
|
||||
msgid "Generate internal reports and store for future reference."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:308
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:316
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:322
|
||||
#: i2p2www/pages/site/research/vrp.html:326
|
||||
msgid "Resolutions"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:324
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:338
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
msgid "Continuous Improvement"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:346
|
||||
#: i2p2www/pages/site/research/vrp.html:349
|
||||
msgid ""
|
||||
"Response Team or designated person(s) should give a brief presentation, "
|
||||
"including:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:350
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
msgid "Areas of I2P affected by the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
msgid "Any network downtime or monetary cost (if any) of the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
msgid "Ways in which the incidents could have been avoided (if any)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
#: i2p2www/pages/site/research/vrp.html:362
|
||||
msgid "How effective this process was in dealing with the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:365
|
||||
#: i2p2www/pages/site/research/vrp.html:368
|
||||
msgid "After the presentation, Response Team and developers should discuss:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:369
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
msgid "Potential changes to development processes to reduce future incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,21 +1,22 @@
|
||||
# Hungarian translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-10-04 00:57+0000\n"
|
||||
"Last-Translator: erinm\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: Hungarian (http://www.transifex.com/otf/I2P/language/hu/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: hu\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -23,34 +24,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -58,20 +48,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -81,15 +64,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -104,10 +83,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -125,52 +102,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -178,19 +141,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -202,32 +161,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -236,36 +183,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -273,10 +207,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -290,7 +222,7 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -425,7 +357,7 @@ msgstr "Rejtett Szolgáltatás"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -496,8 +428,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -516,10 +447,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -527,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -566,8 +496,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -704,4 +634,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,24 +1,24 @@
|
||||
# Indonesian translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Khairul Agasta <khairuldroids@gmail.com>, 2014
|
||||
# Robert Dafis <robertdafis@gmail.com>, 2017-2018
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-10-04 00:21+0000\n"
|
||||
"Last-Translator: erinm\n"
|
||||
"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)"
|
||||
"\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Robert Dafis <robertdafis@gmail.com>, 2017-2018\n"
|
||||
"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: id\n"
|
||||
"Plural-Forms: nplurals=1; plural=0;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -26,103 +26,39 @@ msgstr "I2P Dibandingkan dengan Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer"
|
||||
" to peer anonim, \n"
|
||||
"menawarkan cara aman menyimpan data, serta beberapa pendekatan yang "
|
||||
"berusaha\n"
|
||||
"mengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah "
|
||||
"penyimpanan\n"
|
||||
"data terdistribusi, mereka telah membangun aplikasi diatas untuk "
|
||||
"melakukan \n"
|
||||
"komunikasi anonim yang lebih umum, seperti statistik website dan message "
|
||||
"boards."
|
||||
msgstr "Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer to peer anonim, \nmenawarkan cara aman menyimpan data, serta beberapa pendekatan yang berusaha\nmengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah penyimpanan\ndata terdistribusi, mereka telah membangun aplikasi diatas untuk melakukan \nkomunikasi anonim yang lebih umum, seperti statistik website dan message boards."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan "
|
||||
"substansial - \n"
|
||||
"yaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan "
|
||||
"masyarkat \n"
|
||||
"mendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat "
|
||||
"penerbit \n"
|
||||
"tidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data "
|
||||
"populer cukup \n"
|
||||
"efisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini."
|
||||
" Di sisi lain, \n"
|
||||
"ada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan "
|
||||
"satu \n"
|
||||
"sama lain secara anonim melalui website, message boards, program file "
|
||||
"sharing, etc.\n"
|
||||
"Ada juga beberapa upaya untuk mengembangkan penyimpanan data "
|
||||
"terdistribusi \n"
|
||||
"untuk berjalan diatas I2P,\n"
|
||||
"(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"tetapi saat ini belum siap untuk penggunaan umum."
|
||||
msgstr "Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan substansial - \nyaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan masyarkat \nmendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat penerbit \ntidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data populer cukup \nefisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini. Di sisi lain, \nada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan satu \nsama lain secara anonim melalui website, message boards, program file sharing, etc.\nAda juga beberapa upaya untuk mengembangkan penyimpanan data terdistribusi \nuntuk berjalan diatas I2P,\n(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\ntetapi saat ini belum siap untuk penggunaan umum."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada "
|
||||
"beberapa \n"
|
||||
"kekhawatiran mengenai algoritma Freenet dari kedua perspektif "
|
||||
"skalabilitas dan \n"
|
||||
"anonimitas, karena sebagian besar untuk routing pendorongan heuristic "
|
||||
"Freenet. \n"
|
||||
"Interaksi dari beragam teknik tentu bisa berhasil mencegah berbagai "
|
||||
"serangan, dan \n"
|
||||
"mungkin beberapa aspek algoritma routing akan memberikan skalabilitas "
|
||||
"yang \n"
|
||||
"diharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut "
|
||||
"sertakan berhasil\n"
|
||||
"memberikan hasil yang positif, namun masih ada harapan. Setidaknya, "
|
||||
"Freenet tidak\n"
|
||||
"menyertakan anonimitas substansial terhadap penyerang yang tidak memiliki"
|
||||
"\n"
|
||||
"sumber daya yang diperlukan untuk menganalisa lebih jauh."
|
||||
msgstr "Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada beberapa \nkekhawatiran mengenai algoritma Freenet dari kedua perspektif skalabilitas dan \nanonimitas, karena sebagian besar untuk routing pendorongan heuristic Freenet. \nInteraksi dari beragam teknik tentu bisa berhasil mencegah berbagai serangan, dan \nmungkin beberapa aspek algoritma routing akan memberikan skalabilitas yang \ndiharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut sertakan berhasil\nmemberikan hasil yang positif, namun masih ada harapan. Setidaknya, Freenet tidak\nmenyertakan anonimitas substansial terhadap penyerang yang tidak memiliki\nsumber daya yang diperlukan untuk menganalisa lebih jauh."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -130,51 +66,28 @@ msgstr "Membandingkan I2P dengan projek lain"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi"
|
||||
" \n"
|
||||
"anonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah"
|
||||
" \n"
|
||||
"daftar komprehensif sumber anonimitas - kedua freehaven \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi "
|
||||
"Anonimitas</a>\n"
|
||||
"dan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\n"
|
||||
"melayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\n"
|
||||
"untuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan "
|
||||
"individu:"
|
||||
msgstr "Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi \nanonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah \ndaftar komprehensif sumber anonimitas - kedua freehaven \n<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi Anonimitas</a>\ndan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\nmelayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\nuntuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan individu:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman "
|
||||
"jaringan lain:</a>"
|
||||
msgstr "Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman jaringan lain:</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Konten pada laman ini tunduk pada informasi, diskusi dan perdebatan, dan "
|
||||
"kami menyambut komentar dan tambahan.\n"
|
||||
"Anda dapat mengkontribusikan analisis dengan memasukkan <a "
|
||||
"href=\"%(trac)s\">tiket baru di Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -191,251 +104,116 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Sebagian besar bagian berikut sudah cukup tua dan mungkin tidak akurat. \n"
|
||||
"Untuk overview perbandingan yang tersedia, silakan baca <a "
|
||||
"href=\"%(comparison)s\">halaman perbandingan jaringan utama</a>. Anda "
|
||||
"dapat memberikan kontribusi analisis dengan memasukkan <a "
|
||||
"href=\"%(trac)s\">tiket baru di Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
msgstr ""
|
||||
"RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam "
|
||||
"jaringan\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti "
|
||||
"jaringan F2F \n"
|
||||
"membuat koneksi IP langsung hanya kepada peers (\"friends\") yang "
|
||||
"terotentifikasi setelah\n"
|
||||
"pertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang "
|
||||
"tidak terotentifikasi (misalnya friends dari friends), \n"
|
||||
"tapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi "
|
||||
"dan anonimitas."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr "RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam jaringan\n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti jaringan F2F \nmembuat koneksi IP langsung hanya kepada peers (\"friends\") yang terotentifikasi setelah\npertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang tidak terotentifikasi (misalnya friends dari friends), \ntapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi dan anonimitas."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
"RetroShare didesain untuk membangun jaringan pribadi yang berisi peers "
|
||||
"terpercaya, sementara I2P didesain \n"
|
||||
"sebagai jaringan publik anonim berskala besar. Versi-versi terbaru "
|
||||
"RetroShare memiliki opsi untuk berjalan \n"
|
||||
"sebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai "
|
||||
"transport. Dengan itu, semua koneksi \n"
|
||||
"menjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\""
|
||||
" baru."
|
||||
msgstr "RetroShare didesain untuk membangun jaringan pribadi yang berisi peers terpercaya, sementara I2P didesain \nsebagai jaringan publik anonim berskala besar. Versi-versi terbaru RetroShare memiliki opsi untuk berjalan \nsebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai transport. Dengan itu, semua koneksi \nmenjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\" baru."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim "
|
||||
"terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel "
|
||||
"melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma "
|
||||
"deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara "
|
||||
"Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. "
|
||||
"Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a "
|
||||
"href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy "
|
||||
"mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). "
|
||||
"Ada source code yang tersedia untuk kedua sistem, tapi kami tidak "
|
||||
"mengetahui penggunaannya di luar lingkungan akademis."
|
||||
msgstr "Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). Ada source code yang tersedia untuk kedua sistem, tapi kami tidak mengetahui penggunaannya di luar lingkungan akademis."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion dan Mixmaster adalah jaringan untuk mendukung email anonim "
|
||||
"terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang "
|
||||
"berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau "
|
||||
"I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh "
|
||||
"tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna "
|
||||
"low-latency, untuk menyediakan anonimitas yang secara signifikan lebih "
|
||||
"besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin "
|
||||
"atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu "
|
||||
"dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang "
|
||||
"membutuhkan perlindungan ekstrim untuk email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion dan Mixmaster adalah jaringan untuk mendukung email anonim terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna low-latency, untuk menyediakan anonimitas yang secara signifikan lebih besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang membutuhkan perlindungan ekstrim untuk email."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil "
|
||||
"pendekatan berbasis direktori."
|
||||
msgstr "Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil pendekatan berbasis direktori."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk "
|
||||
"menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat "
|
||||
"(peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien "
|
||||
"melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet"
|
||||
" biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda "
|
||||
"dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang "
|
||||
"signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, "
|
||||
"JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah "
|
||||
"bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin "
|
||||
"berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) "
|
||||
"berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski "
|
||||
"metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa "
|
||||
"data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan"
|
||||
" keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan "
|
||||
"intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian"
|
||||
" tidak dapat diterima di pengadilan)"
|
||||
msgstr "JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat (peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian tidak dapat diterima di pengadilan)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> "
|
||||
"routing yang sama, yang memberikan beberapa derajat anonimitas "
|
||||
"berdasarkan model ancaman untuk memberikan penolakan yang masuk akal "
|
||||
"terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, "
|
||||
"mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan "
|
||||
"beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan "
|
||||
"algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini "
|
||||
"bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang "
|
||||
"orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei "
|
||||
"Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node "
|
||||
"lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat "
|
||||
"anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang "
|
||||
"berada dalam kelompok peer itu)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> routing yang sama, yang memberikan beberapa derajat anonimitas berdasarkan model ancaman untuk memberikan penolakan yang masuk akal terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang berada dalam kelompok peer itu)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin "
|
||||
"berbicara dengan peer tertentu akhirnya melakukan broadcast search atau "
|
||||
"random walk (meski jika mereka cukup beruntung, antnet routing harus "
|
||||
"mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan "
|
||||
"ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk "
|
||||
"jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik "
|
||||
"lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja"
|
||||
" penerapannya terbatas pada situasi di mana ada masalah tertentu harus "
|
||||
"diatasi"
|
||||
msgstr "Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin berbicara dengan peer tertentu akhirnya melakukan broadcast search atau random walk (meski jika mereka cukup beruntung, antnet routing harus mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja penerapannya terbatas pada situasi di mana ada masalah tertentu harus diatasi"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor"
|
||||
" <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus "
|
||||
"dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi "
|
||||
"closed source dan menargetkan secara publik negara tertentu bukanlah ide "
|
||||
"bagus. I2P tentu saja open source. Namun, source code-nya dan <a "
|
||||
"href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut."
|
||||
msgstr "Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi closed source dan menargetkan secara publik negara tertentu bukanlah ide bagus. I2P tentu saja open source. Namun, source code-nya dan <a href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -446,10 +224,8 @@ msgstr "Jasa VPN berbayar"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Anda dapat memberikan kontribusi analisis dengan memasukkan <a "
|
||||
"href=\"%(trac)s\">tiket baru di Trac</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
msgid "Others"
|
||||
@ -477,17 +253,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan"
|
||||
" orang untuk menggunakan tunnel melalui campuran jaringan latency rendah."
|
||||
" Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi "
|
||||
"terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor"
|
||||
" juga mendukung hidden service). Selain itu, Tor mengambil pendekatan "
|
||||
"berbasis direktori - menyediakan titik terpusat untuk mengelola "
|
||||
"keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan "
|
||||
"statistik, berbeda dengan jaringan I2P di mana <a "
|
||||
"href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer "
|
||||
"selection</a> terdistribusi."
|
||||
msgstr "Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan orang untuk menggunakan tunnel melalui campuran jaringan latency rendah. Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor juga mendukung hidden service). Selain itu, Tor mengambil pendekatan berbasis direktori - menyediakan titik terpusat untuk mengelola keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan statistik, berbeda dengan jaringan I2P di mana <a href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer selection</a> terdistribusi."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -500,14 +266,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial"
|
||||
" terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, "
|
||||
"global passive adversaries bisa lebih mudah melakukan analisis lalu "
|
||||
"lintas. Selain itu, outproxies memiliki akses teks dari data yang "
|
||||
"ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan "
|
||||
"semua masalah keamanan lainnya yang kita kenal di lalu lintas internet "
|
||||
"normal."
|
||||
msgstr "Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, global passive adversaries bisa lebih mudah melakukan analisis lalu lintas. Selain itu, outproxies memiliki akses teks dari data yang ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan semua masalah keamanan lainnya yang kita kenal di lalu lintas internet normal."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -517,12 +276,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena "
|
||||
"mereka berada di luar model ancaman mereka. Demikian juga, di luar "
|
||||
"lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun "
|
||||
"fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, "
|
||||
"beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy."
|
||||
msgstr "Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena mereka berada di luar model ancaman mereka. Demikian juga, di luar lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -532,9 +286,7 @@ msgstr "Perbandingan Terminologi di Tor dan I2P"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya "
|
||||
"berbeda."
|
||||
msgstr "Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya berbeda."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -607,8 +359,8 @@ msgstr "Hidden Service"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite atau distinasi"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -678,21 +430,14 @@ msgstr "Manfaat Tor dibandingkan I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di "
|
||||
"komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang"
|
||||
" anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, "
|
||||
"terlihat, bertempat di universitas"
|
||||
msgstr "Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, terlihat, bertempat di universitas"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr ""
|
||||
"Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat "
|
||||
"ditangani"
|
||||
msgstr "Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat ditangani"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:85
|
||||
msgid "Has significant funding"
|
||||
@ -700,40 +445,28 @@ msgstr "Memiliki pendanaan yang cukup banyak"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:86
|
||||
msgid "Has more developers, including several that are funded"
|
||||
msgstr ""
|
||||
"Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat "
|
||||
"pendanaan"
|
||||
msgstr "Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat pendanaan"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport "
|
||||
"TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" "
|
||||
"tapi ini belum diterapkan)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" tapi ini belum diterapkan)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
"Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha"
|
||||
" DOS"
|
||||
msgstr "Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan "
|
||||
"jumlah exit node yang banyak"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan jumlah exit node yang banyak"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, "
|
||||
"situs web yang lebih baik, lebih banyak terjemahan"
|
||||
msgstr "Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, situs web yang lebih baik, lebih banyak terjemahan"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -747,17 +480,13 @@ msgstr "Tor client node memiliki overhead bandwidth yang sangat rendah"
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan "
|
||||
"secara efisien dapat menangani serangan Sybil"
|
||||
msgstr "Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan secara efisien dapat menangani serangan Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi "
|
||||
"dan latency lebih rendah"
|
||||
msgstr "Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi dan latency lebih rendah"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -769,11 +498,9 @@ msgstr "Manfaat I2P dibandingkan Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat "
|
||||
"daripada di Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat daripada di Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -783,23 +510,17 @@ msgstr "Sepenuhnya terdistribusi dan mengorganisi diri sendiri"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, "
|
||||
"daripada mempercayai kapasitas yang diklaim"
|
||||
msgstr "Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, daripada mempercayai kapasitas yang diklaim"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, "
|
||||
"bukan hardcoded"
|
||||
msgstr "Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, bukan hardcoded"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama"
|
||||
" sekali di-DOS"
|
||||
msgstr "Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama sekali di-DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -813,17 +534,13 @@ msgstr "Packet switched alih-alih circuit switched"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa"
|
||||
" peer, bukan satu jalur tunggal"
|
||||
msgstr "Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa peer, bukan satu jalur tunggal"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel,"
|
||||
" ditambah rotating tunnel"
|
||||
msgstr "Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel, ditambah rotating tunnel"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -831,26 +548,19 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 "
|
||||
"inbound terowongan yang digunakan oleh semua peer yang sedang berbicara "
|
||||
"dengan Alice, bukan satu rangkaian untuk masing-masing)"
|
||||
msgstr "Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 inbound terowongan yang digunakan oleh semua peer yang sedang berbicara dengan Alice, bukan satu rangkaian untuk masing-masing)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer"
|
||||
" harus berkompromi untuk mendapatkan informasi yang sama."
|
||||
msgstr "Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer harus berkompromi untuk mendapatkan informasi yang sama."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
msgid "Counter-arguments and further discussion <a href=\"%(netdb)s\">here</a>."
|
||||
msgstr ""
|
||||
"Argumen yang bertentangan dan pembahasan lebih lanjut ada <a "
|
||||
"href=\"%(netdb)s\">di sini</a>."
|
||||
msgstr "Argumen yang bertentangan dan pembahasan lebih lanjut ada <a href=\"%(netdb)s\">di sini</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:171
|
||||
msgid ""
|
||||
@ -859,11 +569,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang "
|
||||
"berpartisipasi dalam terowongan karena terowongan digunakan lebih dari "
|
||||
"sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan "
|
||||
"tunnel, pengujian tunnel)"
|
||||
msgstr "Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang berpartisipasi dalam terowongan karena terowongan digunakan lebih dari sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan tunnel, pengujian tunnel)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -871,18 +577,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat "
|
||||
"digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit "
|
||||
"di Tor, yang biasanya berumur panjang."
|
||||
msgstr "Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit di Tor, yang biasanya berumur panjang."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS "
|
||||
"dirancang untuk fungsionalitas."
|
||||
msgstr "API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS dirancang untuk fungsionalitas."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -893,11 +594,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"Pengeluaran tambahan bandwidth dengan menjadi\n"
|
||||
"full peer sangat rendah, sementara Tor, ketika simpul\n"
|
||||
"klien tidak memerlukan banyak bandwidth, mereka\n"
|
||||
"tidak berpartisipasi penuh dalam mixnet."
|
||||
msgstr "Pengeluaran tambahan bandwidth dengan menjadi\nfull peer sangat rendah, sementara Tor, ketika simpul\nklien tidak memerlukan banyak bandwidth, mereka\ntidak berpartisipasi penuh dalam mixnet."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -917,27 +614,20 @@ msgstr "Potensi keuntungan I2P lainnya namun saat ini belum diimplementasikan"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan "
|
||||
"mereka!"
|
||||
msgstr "...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan mereka!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Pertahanan vs. analisis penghitung pesan dengan membungkus \n"
|
||||
"beberapa pesan seperti bawang"
|
||||
msgstr "Pertahanan vs. analisis penghitung pesan dengan membungkus \nbeberapa pesan seperti bawang"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Pertahanan vs. persimpangan jangka panjang denga \n"
|
||||
"menambahkan delay pada berbagai hop (dimana delay\n"
|
||||
"tidak terlihat oleh hop lain)"
|
||||
msgstr "Pertahanan vs. persimpangan jangka panjang denga \nmenambahkan delay pada berbagai hop (dimana delay\ntidak terlihat oleh hop lain)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -945,9 +635,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Berbagai strategi pencampuran pada level saluran\n"
|
||||
"(misal, membuat saluran yang akan menangani 500 pesan\n"
|
||||
"/ menit, yang mana titik akhir akan menginjek pesan dummy\n"
|
||||
"jika ada ketidakcukupan pesan, dll)"
|
||||
|
||||
msgstr "Berbagai strategi pencampuran pada level saluran\n(misal, membuat saluran yang akan menangani 500 pesan\n/ menit, yang mana titik akhir akan menginjek pesan dummy\njika ada ketidakcukupan pesan, dll)"
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,24 +1,27 @@
|
||||
# Italian translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# alamir <christianm@libero.it>, 2014,2016
|
||||
# Giuseppe Pignataro (Fastbyte01) <rogepix@gmail.com>, 2014
|
||||
# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
|
||||
# alamir <christianm@libero.it>, 2014,2016
|
||||
# Giuseppe Pignataro <rogepix@gmail.com>, 2014
|
||||
# Giuseppe Pignataro <rogepix@gmail.com>, 2014
|
||||
# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-08-24 11:51+0000\n"
|
||||
"Last-Translator: zzzi2p\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Giuseppe Pignataro <rogepix@gmail.com>, 2014\n"
|
||||
"Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: it\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -26,34 +29,23 @@ msgstr "Confronto tra I2P e Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -61,20 +53,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -84,15 +69,11 @@ msgstr "Confronto tra I2P e gli altri progetti"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -102,17 +83,13 @@ msgstr ""
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina"
|
||||
" della rete:</a>"
|
||||
msgstr "I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina della rete:</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -130,52 +107,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -183,19 +146,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -207,32 +166,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -241,36 +188,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -278,10 +212,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -295,7 +227,7 @@ msgstr "Servizi VPN a pagamento"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -357,9 +289,7 @@ msgstr "Confronto tra la la terminologia di I2P e quella di Tor"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Anche se Tor e I2P sono simili sotto molti aspetti, molta della "
|
||||
"terminologia usata è diversa."
|
||||
msgstr "Anche se Tor e I2P sono simili sotto molti aspetti, molta della terminologia usata è diversa."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -432,8 +362,8 @@ msgstr "Servizio nascosto"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite o destinazione"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -503,8 +433,7 @@ msgstr "Benefici ottenuti usando Tor su rete I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -523,10 +452,8 @@ msgstr "Ha più sviluppatori, includendone diversi che sono sovvenzionati"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -534,18 +461,15 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Concepito e ottimizzato per il traffico in uscita, con un alto numero di "
|
||||
"nodi d'uscita"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Concepito e ottimizzato per il traffico in uscita, con un alto numero di nodi d'uscita"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Ha una migliore documentazione, specifiche formali e paper,\n"
|
||||
"un migliore sito web, e molte più traduzioni dell'interfaccia."
|
||||
msgstr "Ha una migliore documentazione, specifiche formali e paper,\nun migliore sito web, e molte più traduzioni dell'interfaccia."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -559,9 +483,7 @@ msgstr "I nodi del client Tor hanno un richiesta di banda accessoria molto bassa
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Un controllo centrale riduce la complessità di ogni\n"
|
||||
"nodo e più resistere efficacemente ad attacchi di tipo Sybil"
|
||||
msgstr "Un controllo centrale riduce la complessità di ogni\nnodo e più resistere efficacemente ad attacchi di tipo Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
@ -579,11 +501,9 @@ msgstr "Benefici ottenuti usando I2P sopra a Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Progettato e ottimizzato per servizi nascosti, che sono molto più veloci "
|
||||
"che in Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Progettato e ottimizzato per servizi nascosti, che sono molto più veloci che in Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -593,10 +513,7 @@ msgstr "Completamente distribuito e auto-organizzante"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"I peer sono selezionati registrando e classificando continuamente le "
|
||||
"prestazioni,\n"
|
||||
"invece che confidando nella capacità dichiarata."
|
||||
msgstr "I peer sono selezionati registrando e classificando continuamente le prestazioni,\ninvece che confidando nella capacità dichiarata."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
@ -722,4 +639,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,26 +1,27 @@
|
||||
# Italian translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# alamir <christianm@libero.it>, 2014
|
||||
# alamir <christianm@libero.it>, 2014
|
||||
# Fletcher Lynd <fletcherlynd@hotmail.com>, 2013
|
||||
# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017
|
||||
# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2021-05-06 14:26+0000\n"
|
||||
"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>"
|
||||
"\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021\n"
|
||||
"Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: it\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -41,16 +42,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -58,49 +54,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Esiste una grande comunità di ricerca che indaga una vasta gamma di "
|
||||
"aspetti \n"
|
||||
"relativi all'anonimato. Per un elenco aggiornato e completo di documenti,"
|
||||
"\n"
|
||||
"consulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven "
|
||||
"Anonymity</a>.\n"
|
||||
"I2P si avvantaggia di molte delle ricerche relative a Tor e all'onion "
|
||||
"routing, \n"
|
||||
"ma c'è poco interesse dedicato alla ricerca nel campo della teoria alla "
|
||||
"base\n"
|
||||
"di I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta "
|
||||
"una\n"
|
||||
"opportunità di ricerca originale unica.\n"
|
||||
msgstr "\nEsiste una grande comunità di ricerca che indaga una vasta gamma di aspetti \nrelativi all'anonimato. Per un elenco aggiornato e completo di documenti,\nconsulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven Anonymity</a>.\nI2P si avvantaggia di molte delle ricerche relative a Tor e all'onion routing, \nma c'è poco interesse dedicato alla ricerca nel campo della teoria alla base\ndi I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta una\nopportunità di ricerca originale unica.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Un elenco di documenti pubblicati inerenti a I2P di cui siamo a "
|
||||
"conoscenza è disponibile <a href=\"%(papers)s\">qui</a>."
|
||||
msgstr "Un elenco di documenti pubblicati inerenti a I2P di cui siamo a conoscenza è disponibile <a href=\"%(papers)s\">qui</a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -114,16 +88,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -134,27 +104,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -170,13 +130,11 @@ msgstr "Linee guida generali"
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -184,10 +142,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -195,10 +151,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -210,32 +164,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -246,13 +192,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -262,35 +205,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -345,8 +276,7 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
@ -355,22 +285,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -397,8 +320,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
@ -411,8 +333,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -432,8 +353,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
@ -441,15 +362,12 @@ msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Capire la gravità di una vulnerabiltà:\n"
|
||||
" "
|
||||
msgstr "\nCapire la gravità di una vulnerabiltà:\n "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
@ -467,19 +385,18 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
@ -502,8 +419,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -512,10 +429,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
@ -550,19 +465,14 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -572,11 +482,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
@ -628,8 +540,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
@ -637,13 +549,14 @@ msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
@ -652,8 +565,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
@ -664,33 +577,28 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
@ -705,7 +613,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
@ -734,15 +643,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
@ -752,10 +659,8 @@ msgstr "Soluzioni"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
@ -765,8 +670,7 @@ msgstr "Continuous Improvement"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
@ -803,4 +707,3 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,22 +1,23 @@
|
||||
# Korean translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# SEPT____ <xpressengine3@mail.beo.kr>, 2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2020-11-04 00:06+0000\n"
|
||||
"Last-Translator: ylsun <y15un@y15un.dog>\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: SEPT____ <xpressengine3@mail.beo.kr>, 2016\n"
|
||||
"Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ko\n"
|
||||
"Plural-Forms: nplurals=1; plural=0;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -24,34 +25,23 @@ msgstr "I2P와 프리넷의 비교"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -59,20 +49,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -82,15 +65,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -105,10 +84,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -126,52 +103,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -179,19 +142,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -203,32 +162,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -237,36 +184,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -274,10 +208,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -291,7 +223,7 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -426,7 +358,7 @@ msgstr "히든 서비스"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -497,8 +429,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -517,10 +448,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -528,7 +457,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -567,8 +497,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -705,4 +635,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,24 +1,25 @@
|
||||
# Dutch translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Just ATranslater <transifex@weinand.nl>, 2017
|
||||
# Martijn de Boer, 2016
|
||||
# Nathan Follens, 2015,2018
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-08-24 11:51+0000\n"
|
||||
"Last-Translator: zzzi2p\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Nathan Follens, 2015,2018\n"
|
||||
"Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: nl\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -26,41 +27,23 @@ msgstr "I2P vergeleken met Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor"
|
||||
" publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief"
|
||||
" mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het"
|
||||
" feit dat Freenet is ontwikkeld als een gedistribueerde manier voor "
|
||||
"gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen"
|
||||
" voor meer algemene vormen van anonieme communicatie, zoals websites en "
|
||||
"forums."
|
||||
msgstr "Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het feit dat Freenet is ontwikkeld als een gedistribueerde manier voor gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen voor meer algemene vormen van anonieme communicatie, zoals websites en forums."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -68,20 +51,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -91,15 +67,11 @@ msgstr "I2P vergeleken met andere projecten"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -114,10 +86,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -135,52 +105,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -188,19 +144,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -212,32 +164,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -246,36 +186,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -283,10 +210,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -300,7 +225,7 @@ msgstr "Betaalde VPN-diensten"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -362,9 +287,7 @@ msgstr "Vergelijking van Tor- en I2P-terminologie"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een "
|
||||
"groot deel van de terminologie verschillend."
|
||||
msgstr "Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een groot deel van de terminologie verschillend."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -437,8 +360,8 @@ msgstr "Verborgen dienst"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite of Doel"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -508,8 +431,7 @@ msgstr "Voordelen van Tor over I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -528,10 +450,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -539,7 +459,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -578,8 +499,8 @@ msgstr "Voordelen van I2P over Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -694,9 +615,7 @@ msgstr "Andere mogelijke voordelen van I2P die nog niet geïmplementeerd zijn"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet "
|
||||
"op!"
|
||||
msgstr "en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet op!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
@ -718,4 +637,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,25 +1,24 @@
|
||||
# Polish translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# kRkk <krkkx@protonmail.com>, 2018
|
||||
# Verdulo :-), 2016
|
||||
# Karol Kosek, 2018
|
||||
# ☆Verdulo, 2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-10-04 00:20+0000\n"
|
||||
"Last-Translator: erinm\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Karol Kosek, 2018\n"
|
||||
"Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && "
|
||||
"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && "
|
||||
"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: pl\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -27,82 +26,39 @@ msgstr "I2P w porównaniu z Freenetem"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet jest w pełni rozproszoną, anonimową, \"publikującą\" siecią peer-"
|
||||
"to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i "
|
||||
"także stara się rozwiązać problem przeciążenia serwerów wynikającego z "
|
||||
"nagłego wzrostu zainteresowania daną treścią. Podczas gdy Freenet został "
|
||||
"zaprojektowany jako rozproszony magazyn plików, powstały aplikacje "
|
||||
"pracujące na nim i pozwalające na bardziej ogólne sposoby anonimowej "
|
||||
"komunikacji, takie jak statyczne strony i listy dyskusyjne."
|
||||
msgstr "Freenet jest w pełni rozproszoną, anonimową, \"publikującą\" siecią peer-to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i także stara się rozwiązać problem przeciążenia serwerów wynikającego z nagłego wzrostu zainteresowania daną treścią. Podczas gdy Freenet został zaprojektowany jako rozproszony magazyn plików, powstały aplikacje pracujące na nim i pozwalające na bardziej ogólne sposoby anonimowej komunikacji, takie jak statyczne strony i listy dyskusyjne."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym "
|
||||
"magazynem plików w przeciwieństwie do I2P, co pozwala na dostęp do "
|
||||
"udostępnionych treści, nawet gdy udostępniający nie jest już połączony do"
|
||||
" sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle "
|
||||
"efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to "
|
||||
"obciążenie dla tych osób, które chcą po prostu anonimowej komunikacji z "
|
||||
"innymi poprzez strony, listy dyskusyjne, wymianę plików, itd. Są próby "
|
||||
"stworzenia rozproszonego magazynu plików działającego na sieci I2P, "
|
||||
"(ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie "
|
||||
"jest jeszcze gotowy do powszechnego użytku."
|
||||
msgstr "W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym magazynem plików w przeciwieństwie do I2P, co pozwala na dostęp do udostępnionych treści, nawet gdy udostępniający nie jest już połączony do sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to obciążenie dla tych osób, które chcą po prostu anonimowej komunikacji z innymi poprzez strony, listy dyskusyjne, wymianę plików, itd. Są próby stworzenia rozproszonego magazynu plików działającego na sieci I2P, (ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie jest jeszcze gotowy do powszechnego użytku."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Jednakże, nawet pomijając kwestie implementacji, rozważa się problemy "
|
||||
"dotyczące algorytmów Freeneetu mając na uwadze zarówno skalowalność jak i"
|
||||
" anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie "
|
||||
"różnych technik ma za zadanie udaremnić ataki, i być może niektóre "
|
||||
"aspekty algorytmów trasowania mają dać skalowalność. Niestety niewiele "
|
||||
"analiz algorytmów dało pozytywne wyniki, ale wciąż jest nadzieja. "
|
||||
"Ostatecznie Freenet zapewnia znaczącą ochronę anonimowości, dopóki "
|
||||
"przeciwnik nie dysponuje zasobami pozwalającymi na dalszą analizę."
|
||||
msgstr "Jednakże, nawet pomijając kwestie implementacji, rozważa się problemy dotyczące algorytmów Freeneetu mając na uwadze zarówno skalowalność jak i anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie różnych technik ma za zadanie udaremnić ataki, i być może niektóre aspekty algorytmów trasowania mają dać skalowalność. Niestety niewiele analiz algorytmów dało pozytywne wyniki, ale wciąż jest nadzieja. Ostatecznie Freenet zapewnia znaczącą ochronę anonimowości, dopóki przeciwnik nie dysponuje zasobami pozwalającymi na dalszą analizę."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -110,15 +66,11 @@ msgstr "Porównywanie I2P do innych projektów"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -133,10 +85,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -154,52 +104,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -207,19 +143,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -231,32 +163,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -265,36 +185,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -302,10 +209,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -319,7 +224,7 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -454,7 +359,7 @@ msgstr "Ukryta usługa"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -525,8 +430,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -545,10 +449,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -556,7 +458,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -595,8 +498,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -733,4 +636,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,23 +1,23 @@
|
||||
# Romanian translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# polearnik <polearnik@mail.ru>, 2019
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2019-09-07 06:39+0000\n"
|
||||
"Last-Translator: polearnik <polearnik@mail.ru>\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: polearnik <polearnik@mail.ru>, 2019\n"
|
||||
"Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n"
|
||||
"Plural-Forms: nplurals=3; "
|
||||
"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ro\n"
|
||||
"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -25,85 +25,39 @@ msgstr "I2P in comparatie cu Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet este o rețea de publicare anonima distribuita pe deplin, egal la "
|
||||
"egal , oferind metode sigure de a stoca date, precum și încearcă să facă "
|
||||
"fata inundărilor de trafic. În timp ce Freenet este conceput ca un "
|
||||
"depozit de date distribuite, persoane au construit aplicații pentru a "
|
||||
"face comunicarea anonimă mai generice, cum ar fi site-uri web statice și "
|
||||
"forumuri."
|
||||
msgstr "Freenet este o rețea de publicare anonima distribuita pe deplin, egal la egal , oferind metode sigure de a stoca date, precum și încearcă să facă fata inundărilor de trafic. În timp ce Freenet este conceput ca un depozit de date distribuite, persoane au construit aplicații pentru a face comunicarea anonimă mai generice, cum ar fi site-uri web statice și forumuri."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparativ cu I2P, Freenet oferă unele avantaje substanțiale - este un "
|
||||
"depozit de date distribuite, în timp ce I2P nu este, permite oamenilor "
|
||||
"pentru a prelua conținutul publicat de către alte persoane, chiar atunci "
|
||||
"când editorul nu mai este on-line. În plus, ar trebui să fie în măsură de"
|
||||
" a distribui date populare destul de eficient. I2P în sine nu are și nu "
|
||||
"va oferi această funcționalitate. Pe de altă parte, există o suprapunere "
|
||||
"utilizatorilor care doar să comunice unul cu celălalt anonim prin "
|
||||
"intermediul site-uri, forumuri, programe de file sharing, etc asemenea, "
|
||||
"au existat câteva tentative de a elabora un magazin de date distribuite "
|
||||
"pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a "
|
||||
"href=\"%(tahoe)s\"> Tahoe-LAFS </ a>), dar nimic nu este inca gata "
|
||||
"pentru uz general."
|
||||
msgstr "Comparativ cu I2P, Freenet oferă unele avantaje substanțiale - este un depozit de date distribuite, în timp ce I2P nu este, permite oamenilor pentru a prelua conținutul publicat de către alte persoane, chiar atunci când editorul nu mai este on-line. În plus, ar trebui să fie în măsură de a distribui date populare destul de eficient. I2P în sine nu are și nu va oferi această funcționalitate. Pe de altă parte, există o suprapunere utilizatorilor care doar să comunice unul cu celălalt anonim prin intermediul site-uri, forumuri, programe de file sharing, etc asemenea, au existat câteva tentative de a elabora un magazin de date distribuite pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a href=\"%(tahoe)s\"> Tahoe-LAFS </ a>), dar nimic nu este inca gata pentru uz general."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Cu toate acestea, chiar și ignorând orice probleme implementării, există "
|
||||
"unele preocupări cu privire algoritmi Freenet scalabilitate și de "
|
||||
"perspectivă anonimata, datorită în mare parte la euristica Freenet "
|
||||
"condusa de rutare. Interacțiunile de diferite tehnici de siguranță pot "
|
||||
"descuraja cu succes diferite atacuri, și, probabil, unele aspecte ale "
|
||||
"algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, "
|
||||
"analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, "
|
||||
"dar încă mai există speranță. Cel puțin, Freenet nu oferă anonimatul "
|
||||
"substanțial față de un atacator care nu are resursele necesare pentru a "
|
||||
"analiza în continuare."
|
||||
msgstr "Cu toate acestea, chiar și ignorând orice probleme implementării, există unele preocupări cu privire algoritmi Freenet scalabilitate și de perspectivă anonimata, datorită în mare parte la euristica Freenet condusa de rutare. Interacțiunile de diferite tehnici de siguranță pot descuraja cu succes diferite atacuri, și, probabil, unele aspecte ale algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, dar încă mai există speranță. Cel puțin, Freenet nu oferă anonimatul substanțial față de un atacator care nu are resursele necesare pentru a analiza în continuare."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -111,48 +65,28 @@ msgstr "I2P in comparatie cu alte proiecte"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Există o mulțime de alte aplicații și proiecte ce lucrează asupra "
|
||||
"comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor "
|
||||
"lor. Aceasta nu este o listă completă a resurselor de anonimat - <a "
|
||||
"href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie "
|
||||
"Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-"
|
||||
"uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva "
|
||||
"sisteme se disting prin comparație continua. Următoarele pagini au "
|
||||
"comparații individuale :"
|
||||
msgstr "Există o mulțime de alte aplicații și proiecte ce lucrează asupra comunicării anonimă și I2P a fost inspirat de o mare parte a eforturilor lor. Aceasta nu este o listă completă a resurselor de anonimat - <a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie Anonimatului</a> și de GNUnet <a href = \"https://www .gnunet.org/link-uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva sisteme se disting prin comparație continua. Următoarele pagini au comparații individuale :"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte "
|
||||
"retele: </ a>"
|
||||
msgstr "Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte retele: </ a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Conținutul acestei pagini este subiectul actualizarii, discuții și "
|
||||
"dispute, și observații și completări sunt binevenite. Puteți contribui o "
|
||||
"analiză prin introducerea unui <a href=\"%(trac)s\"> bilet nou pe Trac "
|
||||
"</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -169,253 +103,116 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Cele mai multe dintre următoarele secțiuni sunt destul de vechi, și ar "
|
||||
"putea să nu fie exacte. Pentru o privire de ansamblu asupra comparații "
|
||||
"disponibile, a se vedea href=\"%(comparison)s\"> pagina principală "
|
||||
"comparații rețea </ a>. Puteți contribui o analiză prin introducerea unui"
|
||||
" <a href=\"%(trac)s\"> bilet nou pe Trac </ a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
msgstr ""
|
||||
"RetroShare este un set de aplicații peer-to-peer care rulează în\n"
|
||||
"Rețea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg"
|
||||
" de astfel de F2F\n"
|
||||
"rețeaua face conexiuni IP directe numai la colegii autenticați "
|
||||
"(„prieteni”) după ce sunt explicite\n"
|
||||
"schimb de certificate. Poate descoperi colegi neautentificați (de "
|
||||
"exemplu, prietenii prietenilor),\n"
|
||||
"dar conexiunile la aceștia sunt transmise peste colegii „prieteni” pentru"
|
||||
" a oferi confidențialitate și anonimat."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr "RetroShare este un set de aplicații peer-to-peer care rulează în\nRețea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg de astfel de F2F\nrețeaua face conexiuni IP directe numai la colegii autenticați („prieteni”) după ce sunt explicite\nschimb de certificate. Poate descoperi colegi neautentificați (de exemplu, prietenii prietenilor),\ndar conexiunile la aceștia sunt transmise peste colegii „prieteni” pentru a oferi confidențialitate și anonimat."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
"RetroShare este conceput pentru a construi o rețea privată de colegi de "
|
||||
"încredere, în timp ce I2P este proiectat\n"
|
||||
"să fie o rețea publică anonimă la scară largă. Versiunile recente ale "
|
||||
"RetroShare au opțiuni de rulat\n"
|
||||
"ca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel"
|
||||
" sunt toate conexiunile\n"
|
||||
"anonimizat și nu este necesară încredere pentru adăugarea de „prieteni” "
|
||||
"noi."
|
||||
msgstr "RetroShare este conceput pentru a construi o rețea privată de colegi de încredere, în timp ce I2P este proiectat\nsă fie o rețea publică anonimă la scară largă. Versiunile recente ale RetroShare au opțiuni de rulat\nca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel sunt toate conexiunile\nanonimizat și nu este necesară încredere pentru adăugarea de „prieteni” noi."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix și Tarzan sunt ambele complet distribuite , de tip peer-to-peer "
|
||||
"rețelele de proxy-uri anonime, care permit oamenilor să tunel prin "
|
||||
"intermediul rețelei de amestec scăzut latență. Morphmix include unele "
|
||||
"algoritmi foarte interesante de detectare a comploturilor și apărare "
|
||||
"Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a "
|
||||
"realiza aceasta. Cele două diferențe principale între aceste sisteme și "
|
||||
"I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul amenințare I2P "
|
||||
"</a> și proiectarea lor de-proxy (spre deosebire de a oferi atât "
|
||||
"anonimare expeditorului și receptorului). Există un cod sursă disponibil "
|
||||
"pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în "
|
||||
"afara mediilor academice."
|
||||
msgstr "Morphmix și Tarzan sunt ambele complet distribuite , de tip peer-to-peer rețelele de proxy-uri anonime, care permit oamenilor să tunel prin intermediul rețelei de amestec scăzut latență. Morphmix include unele algoritmi foarte interesante de detectare a comploturilor și apărare Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a realiza aceasta. Cele două diferențe principale între aceste sisteme și I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul amenințare I2P </a> și proiectarea lor de-proxy (spre deosebire de a oferi atât anonimare expeditorului și receptorului). Există un cod sursă disponibil pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în afara mediilor academice."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"Mixminion și Mixmaster sunt rețele de suport e-mail anonim împotriva unui"
|
||||
" adversar foarte puternic. Aplicații high-latență de mesagerie care "
|
||||
"rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> "
|
||||
"Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a "
|
||||
"satisface modelul amenințarea acestor adversari, în timp ce rulează în "
|
||||
"paralel de-a lungul partea de nevoile utilizatorilor latență redusă, "
|
||||
"pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă"
|
||||
" latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un "
|
||||
"comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va"
|
||||
" satisface nevoile utilizatorilor care necesită protecție extrem de "
|
||||
"e-mail."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "Mixminion și Mixmaster sunt rețele de suport e-mail anonim împotriva unui adversar foarte puternic. Aplicații high-latență de mesagerie care rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a satisface modelul amenințarea acestor adversari, în timp ce rulează în paralel de-a lungul partea de nevoile utilizatorilor latență redusă, pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va satisface nevoile utilizatorilor care necesită protecție extrem de e-mail."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Ca și în cazul Tor și ceapa de rutare, atât Mixminion și Mixmaster ia o "
|
||||
"abordare bazată pe directorul "
|
||||
msgstr "Ca și în cazul Tor și ceapa de rutare, atât Mixminion și Mixmaster ia o abordare bazată pe directorul "
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP ( Java Proxy Anonim ) este o rețea de cascade de amestece pentru "
|
||||
"anonimizarea cererilor de web , și , ca atare, are câteva noduri "
|
||||
"centralizate ( participanții la cascada ), care amesteca cereri de la "
|
||||
"clienti prin secvența de noduri (cascadă ) înainte de proxy de pe web . "
|
||||
"Domeniul de aplicare , modelul de amenințare , si siguranța este "
|
||||
"substanțial diferită de I2P , dar pentru cei care nu au nevoie de "
|
||||
"anonimat semnificativ , dar încă nu sunt mulțumit cu un Anonymizer - cum "
|
||||
"ar fi serviciu , JAP este în valoare de revizuire . O remarcare de "
|
||||
"prudenta este faptul că oricine sub jurisdicția instanțelor germane ar "
|
||||
"putea dori să aibă grijă , ca Biroul Federal German de Investigații "
|
||||
"Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe "
|
||||
"rețea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi "
|
||||
"ilegal în instanțele germane , faptul că datele au fost colectate cu "
|
||||
"succes . Instanțele schimba mintea lor bazate pe situație , iar acest "
|
||||
"lucru este o dovadă că în cazul în care un organism guvernamental sau "
|
||||
"agenția de informații a vrut , ar putea aduna date , chiar dacă acesta "
|
||||
"poate fi găsite inadmisibile în unele instanțe mai târziu )\n"
|
||||
msgstr "JAP ( Java Proxy Anonim ) este o rețea de cascade de amestece pentru anonimizarea cererilor de web , și , ca atare, are câteva noduri centralizate ( participanții la cascada ), care amesteca cereri de la clienti prin secvența de noduri (cascadă ) înainte de proxy de pe web . Domeniul de aplicare , modelul de amenințare , si siguranța este substanțial diferită de I2P , dar pentru cei care nu au nevoie de anonimat semnificativ , dar încă nu sunt mulțumit cu un Anonymizer - cum ar fi serviciu , JAP este în valoare de revizuire . O remarcare de prudenta este faptul că oricine sub jurisdicția instanțelor germane ar putea dori să aibă grijă , ca Biroul Federal German de Investigații Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe rețea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi ilegal în instanțele germane , faptul că datele au fost colectate cu succes . Instanțele schimba mintea lor bazate pe situație , iar acest lucru este o dovadă că în cazul în care un organism guvernamental sau agenția de informații a vrut , ar putea aduna date , chiar dacă acesta poate fi găsite inadmisibile în unele instanțe mai târziu )\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Ambele din aceste sisteme funcționează prin aceeași baza <a "
|
||||
"href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de "
|
||||
"anonimat bazat pe modelul amenințarea de a oferi negare plauzibilă față "
|
||||
"de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, "
|
||||
"fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii "
|
||||
"utilizatori cu datele de identitate sau dorite, iar apoi folosiți un "
|
||||
"algoritm de feedback pentru a optimiza această cale gasita. Aceasta "
|
||||
"funcționează bine pentru aplicații care pur și simplu doresc să știe ce "
|
||||
"alți oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice,"
|
||||
" ce mai faci\" - veți obține de fapt un grup local, de noduri, care pot "
|
||||
"partaja fișiere cu și menține un anumit grad de anonimat (dacă nu aveți "
|
||||
"mai mult control asupra cine este în acel grup de colegii)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Ambele din aceste sisteme funcționează prin aceeași baza <a href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de anonimat bazat pe modelul amenințarea de a oferi negare plauzibilă față de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii utilizatori cu datele de identitate sau dorite, iar apoi folosiți un algoritm de feedback pentru a optimiza această cale gasita. Aceasta funcționează bine pentru aplicații care pur și simplu doresc să știe ce alți oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice, ce mai faci\" - veți obține de fapt un grup local, de noduri, care pot partaja fișiere cu și menține un anumit grad de anonimat (dacă nu aveți mai mult control asupra cine este în acel grup de colegii)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în "
|
||||
"care cererea vrea să vorbească cu un anumit utilizator se termină prin a "
|
||||
"face o emisiune de căutare sau de mers aleator (deși, dacă acestea sunt "
|
||||
"suficient de norocos pentru a reuși, de rutare antnet ar trebui să "
|
||||
"optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce "
|
||||
"aceste rețele pot lucra bine la solzi mici, ele nu sunt potrivite pentru "
|
||||
"retele mari în cazul în care cineva vrea să intre în contact cu un alt "
|
||||
"inter pares. Asta nu înseamnă că nu există nicio valoare în aceste "
|
||||
"sisteme, doar că aplicabilitatea lor este limitată la situațiile în care "
|
||||
"problemele lor specifice pot fi abordate."
|
||||
msgstr "Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în care cererea vrea să vorbească cu un anumit utilizator se termină prin a face o emisiune de căutare sau de mers aleator (deși, dacă acestea sunt suficient de norocos pentru a reuși, de rutare antnet ar trebui să optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce aceste rețele pot lucra bine la solzi mici, ele nu sunt potrivite pentru retele mari în cazul în care cineva vrea să intre în contact cu un alt inter pares. Asta nu înseamnă că nu există nicio valoare în aceste sisteme, doar că aplicabilitatea lor este limitată la situațiile în care problemele lor specifice pot fi abordate."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Aceasta a fost o rețea închisă-source destinata utilizatorilor iraniene. "
|
||||
"Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să "
|
||||
"caute într-un instrument de eludare </ a>. Este suficient să spunem că "
|
||||
"este o sursa închisă și care vizează în mod public o anumită țară nu sunt"
|
||||
" idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această "
|
||||
"sursă, și documentația noastră <a href=\"%(docs)s\">tehnice </a>, are "
|
||||
"nevoie de mult mai multa revizuire."
|
||||
msgstr "Aceasta a fost o rețea închisă-source destinata utilizatorilor iraniene. Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să caute într-un instrument de eludare </ a>. Este suficient să spunem că este o sursa închisă și care vizează în mod public o anumită țară nu sunt idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această sursă, și documentația noastră <a href=\"%(docs)s\">tehnice </a>, are nevoie de mult mai multa revizuire."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -426,10 +223,8 @@ msgstr "Servicii VPN platite"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Puteți contribui o analiză prin introducerea unui <a href=\"%(trac)s\"> "
|
||||
"bilet nou pe Trac </a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
msgid "Others"
|
||||
@ -457,17 +252,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor și Onion Routing sunt rețele anonime proxy, permițând oamenilor să "
|
||||
"tuneleze prin intermediul rețelei de amestec latență scăzuta. Cele două "
|
||||
"diferențe principale între Tor/onion-routing și I2P sunt în legătură cu"
|
||||
" diferențele de model-amenințare și de design de-proxy (deși Tor acceptă "
|
||||
"servicii ascunse, de asemenea). În plus, Tor are abordarea directorului "
|
||||
"bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" "
|
||||
"generale a rețelei, precum și adunarea și raportarea statistici, spre "
|
||||
"deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date "
|
||||
"rețea </ a> și <a href=\"%(peerselection)s\">selecție egal la egal </ "
|
||||
"a>."
|
||||
msgstr "Tor și Onion Routing sunt rețele anonime proxy, permițând oamenilor să tuneleze prin intermediul rețelei de amestec latență scăzuta. Cele două diferențe principale între Tor/onion-routing și I2P sunt în legătură cu diferențele de model-amenințare și de design de-proxy (deși Tor acceptă servicii ascunse, de asemenea). În plus, Tor are abordarea directorului bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" generale a rețelei, precum și adunarea și raportarea statistici, spre deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date rețea </ a> și <a href=\"%(peerselection)s\">selecție egal la egal </ a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -480,14 +265,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"Funcționalitatea outproxy I2P/Tor are câteva puncte slabe importante "
|
||||
"împotriva unor agresori - odata comunicarea părăsește mixnet, adversarea "
|
||||
"pasiva la nivel mondial se poate mai ușor monta analiza traficului. În "
|
||||
"plus, outproxies au acces la textul datelor transferate în ambele "
|
||||
"direcții, și outproxies sunt predispuse la abuz, împreună cu toate "
|
||||
"celelalte probleme de securitate le-am venit să-l cunoastem cu trafic "
|
||||
"normal din Internet."
|
||||
msgstr "Funcționalitatea outproxy I2P/Tor are câteva puncte slabe importante împotriva unor agresori - odata comunicarea părăsește mixnet, adversarea pasiva la nivel mondial se poate mai ușor monta analiza traficului. În plus, outproxies au acces la textul datelor transferate în ambele direcții, și outproxies sunt predispuse la abuz, împreună cu toate celelalte probleme de securitate le-am venit să-l cunoastem cu trafic normal din Internet."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -497,14 +275,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu "
|
||||
"privire la aceste situații, deoarece acestea sunt în afara modelului lor "
|
||||
"de amenințare. Este, de asemenea, în afara (formal) domeniul de aplicare "
|
||||
"funcțională I2P lui (în cazul în care oamenii doresc să construiască "
|
||||
"funcționalitate outproxy pe partea de sus a unui strat de comunicare "
|
||||
"anonimă, ei pot). De fapt, unii utilizatori de I2P în prezent profita de"
|
||||
" Tor la outproxy."
|
||||
msgstr "Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu privire la aceste situații, deoarece acestea sunt în afara modelului lor de amenințare. Este, de asemenea, în afara (formal) domeniul de aplicare funcțională I2P lui (în cazul în care oamenii doresc să construiască funcționalitate outproxy pe partea de sus a unui strat de comunicare anonimă, ei pot). De fapt, unii utilizatori de I2P în prezent profita de Tor la outproxy."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -514,9 +285,7 @@ msgstr "Compararea cu Tor și I2P terminologie"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"În timp ce Tor și I2P sunt similare în multe feluri, o mare parte din "
|
||||
"terminologie este diferita."
|
||||
msgstr "În timp ce Tor și I2P sunt similare în multe feluri, o mare parte din terminologie este diferita."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -589,8 +358,8 @@ msgstr "Serviciul ascuns"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr "Eepsite sau Destinatie"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Hidden Service Descriptor"
|
||||
@ -660,21 +429,14 @@ msgstr "Beneficiile Tor peste I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Baza mult mai mare de utilizatori; vizibilitate mult mai multa în "
|
||||
"comunitățile academice și hacker, beneficiaza de studii formale de "
|
||||
"anonimat, rezistenta, și de performanță, vizibila, liderul non-anonim "
|
||||
"universitate pe baza de"
|
||||
msgstr "Baza mult mai mare de utilizatori; vizibilitate mult mai multa în comunitățile academice și hacker, beneficiaza de studii formale de anonimat, rezistenta, și de performanță, vizibila, liderul non-anonim universitate pe baza de"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr ""
|
||||
"S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru "
|
||||
"adresare"
|
||||
msgstr "S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru adresare"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:85
|
||||
msgid "Has significant funding"
|
||||
@ -686,34 +448,24 @@ msgstr "Are mai multe dezvoltatori, inclusiv câteva care sunt finanțate"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Mai rezistent la blocarea din cauza stratului transport TLS și poduri "
|
||||
"(I2P are propuneri pentru \"rute restricționate complete\", dar acestea "
|
||||
"încă nu sunt puse în aplicare )"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Mai rezistent la blocarea din cauza stratului transport TLS și poduri (I2P are propuneri pentru \"rute restricționate complete\", dar acestea încă nu sunt puse în aplicare )"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
"Suficient de mare pentru că a trebuit să se adapteze la blocarea și DOS "
|
||||
"încercări"
|
||||
msgstr "Suficient de mare pentru că a trebuit să se adapteze la blocarea și DOS încercări"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Concepute și optimizate pentru traficul de ieșire, cu un număr mare de "
|
||||
"noduri de ieșire"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Concepute și optimizate pentru traficul de ieșire, cu un număr mare de noduri de ieșire"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Documentația mai bună, are acte oficiale și specificațiile, site-ul mai "
|
||||
"bun, mult mai multe traduceri"
|
||||
msgstr "Documentația mai bună, are acte oficiale și specificațiile, site-ul mai bun, mult mai multe traduceri"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -727,17 +479,13 @@ msgstr "Nodurile client Tor au foarte putin trafic overhead"
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Control centralizat reduce complexitatea de la fiecare nod și poate "
|
||||
"răspunde în mod eficient atacuri Sybil"
|
||||
msgstr "Control centralizat reduce complexitatea de la fiecare nod și poate răspunde în mod eficient atacuri Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"O bază de noduri de mare capacitate oferă transfer mai mare și latență "
|
||||
"mai mică"
|
||||
msgstr "O bază de noduri de mare capacitate oferă transfer mai mare și latență mai mică"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -749,11 +497,9 @@ msgstr "Beneficiile I2P peste Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Concepute și optimizate pentru serviciile ascunse, care sunt mult mai "
|
||||
"rapide decât în Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Concepute și optimizate pentru serviciile ascunse, care sunt mult mai rapide decât în Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -763,23 +509,17 @@ msgstr "Complet distribuit și de auto organizare"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Colegii sunt selectate de către profilare continua si clasament de "
|
||||
"performanță, mai degrabă decât încredere în capacitatea de a pretins"
|
||||
msgstr "Colegii sunt selectate de către profilare continua si clasament de performanță, mai degrabă decât încredere în capacitatea de a pretins"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Colegii Floodfill (\"serverele director\") sunt diferiti și nu sunt de "
|
||||
"încredere, mai degrabă decât codate"
|
||||
msgstr "Colegii Floodfill (\"serverele director\") sunt diferiti și nu sunt de încredere, mai degrabă decât codate"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Suficient de mici pentru că sa nu fie blocati sau administrati demult, "
|
||||
"sau deloc"
|
||||
msgstr "Suficient de mici pentru că sa nu fie blocati sau administrati demult, sau deloc"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -793,17 +533,13 @@ msgstr "Comutarea pachetelor în loc de comutarea circuitelor"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"balansare incarcarii implicita si transparentă a mesajelor pe mai multe "
|
||||
"colegii, mai des decât o singură cale"
|
||||
msgstr "balansare incarcarii implicita si transparentă a mesajelor pe mai multe colegii, mai des decât o singură cale"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"rezistența vs eșecurile prin rularea mai multor tuneluri în paralel, plus"
|
||||
" tuneluri rotative"
|
||||
msgstr "rezistența vs eșecurile prin rularea mai multor tuneluri în paralel, plus tuneluri rotative"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -811,21 +547,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de "
|
||||
"exemplu are 2 tuneluri de intrare care sunt utilizate de către toti "
|
||||
"colegi cu care Alice converseaza , mai degrabă decât un circuit pentru "
|
||||
"fiecare)"
|
||||
msgstr "scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de exemplu are 2 tuneluri de intrare care sunt utilizate de către toti colegi cu care Alice converseaza , mai degrabă decât un circuit pentru fiecare)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Tuneluri unidirecționale în loc de circuite bidirecționale, dublarea "
|
||||
"numărului de noduri colegilor trebuie să facă un compromis pentru a "
|
||||
"obține aceleași informații."
|
||||
msgstr "Tuneluri unidirecționale în loc de circuite bidirecționale, dublarea numărului de noduri colegilor trebuie să facă un compromis pentru a obține aceleași informații."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -839,11 +568,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protecția împotriva detectarii de activitate clientului, chiar și atunci "
|
||||
"când un atacator participă la tunel, așa cum tuneluri sunt folosite "
|
||||
"pentru mai multe decât pur și simplu trecerea intr-un capăt mesaje finali"
|
||||
" (de exemplu netDb, managementul tunel, tunel"
|
||||
msgstr "Protecția împotriva detectarii de activitate clientului, chiar și atunci când un atacator participă la tunel, așa cum tuneluri sunt folosite pentru mai multe decât pur și simplu trecerea intr-un capăt mesaje finali (de exemplu netDb, managementul tunel, tunel"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -851,18 +576,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe "
|
||||
"care un atacator poate folosi pentru a monta un atac activ , spre "
|
||||
"deosebire de circuite din Tor, care de obicei au viata lunga."
|
||||
msgstr "Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe care un atacator poate folosi pentru a monta un atac activ , spre deosebire de circuite din Tor, care de obicei au viata lunga."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"I2P API-uri sunt proiectate special pentru anonimatul și securitate, în "
|
||||
"timp ce SOCKS este proiectat pentru funcționalitate."
|
||||
msgstr "I2P API-uri sunt proiectate special pentru anonimatul și securitate, în timp ce SOCKS este proiectat pentru funcționalitate."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -873,10 +593,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce "
|
||||
"nodurile client nu necesită mai mult de lățime de bandă, ele nu participă"
|
||||
" pe deplin la mixnet."
|
||||
msgstr "Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce nodurile client nu necesită mai mult de lățime de bandă, ele nu participă pe deplin la mixnet."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -902,19 +619,14 @@ msgstr "... și posibil sa nu fie puse în aplicare, astfel încât nu conta pe
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai "
|
||||
"multe mesaje"
|
||||
msgstr "Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai multe mesaje"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Apărare vs intersecție pe termen lung prin adăugarea de întârzieri la "
|
||||
"diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin "
|
||||
"alte hamei)"
|
||||
msgstr "Apărare vs intersecție pe termen lung prin adăugarea de întârzieri la diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin alte hamei)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -922,8 +634,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un "
|
||||
"tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul"
|
||||
" va injecta mesaje false dacă există mesaje insuficiente, etc)"
|
||||
|
||||
msgstr "Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul va injecta mesaje false dacă există mesaje insuficiente, etc)"
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# Russian translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Aleksey Orekhov <opexob@yandex.ru>, 2013
|
||||
# Aleksey Vyskubov <viskubov@gmail.com>, 2016
|
||||
@ -12,20 +12,18 @@
|
||||
# R4SAS, 2019
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2021-04-26 14:55+0000\n"
|
||||
"Last-Translator: zzzi2p\n"
|
||||
"Language-Team: Russian (Russia) "
|
||||
"(http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && "
|
||||
"n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) "
|
||||
"|| (n%100>=11 && n%100<=14)? 2 : 3)\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Irina Fedulova <istartlin@gmail.com>, 2020\n"
|
||||
"Language-Team: Russian (Russia) (http://www.transifex.com/otf/I2P/language/ru_RU/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ru_RU\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) || (n%100>=11 && n%100<=14)? 2 : 3);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -33,88 +31,39 @@ msgstr "I2P в сравнении с Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet - это полностью распределенная, точка-точка, анонимная сеть для "
|
||||
"публикации, предоставляющая безопасный способ хранить данные, также "
|
||||
"некоторые подходы, позволяющие обрабатывать нагрузки\n"
|
||||
"в пиках. Хотя Freenet разработан как распределенное хранилище, "
|
||||
"пользователи сделали\n"
|
||||
"приложения поверх него, которые позволяют другие формы взаимодействия, "
|
||||
"такие как статичные\n"
|
||||
"веб-сайты и доски сообщений."
|
||||
msgstr "Freenet - это полностью распределенная, точка-точка, анонимная сеть для публикации, предоставляющая безопасный способ хранить данные, также некоторые подходы, позволяющие обрабатывать нагрузки\nв пиках. Хотя Freenet разработан как распределенное хранилище, пользователи сделали\nприложения поверх него, которые позволяют другие формы взаимодействия, такие как статичные\nвеб-сайты и доски сообщений."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"По сравнению с I2P, Freenet имеет некоторые преимущества - это "
|
||||
"распределенное хранилище\n"
|
||||
"данных, чем I2P не является, позволяющее людям обмениваться данными, даже"
|
||||
" если оригинальный\n"
|
||||
"автор более недоступен. Также сеть позволяет эффективно распределять "
|
||||
"данные. I2P сам по себе не имеет и не будет иметь такой функции. С другой"
|
||||
" стороны, здесь есть недостаток для пользователей, которые просто хотят "
|
||||
"анонимно общаться через веб-сайты, доски объявлений, программы "
|
||||
"файлообмена и т.д\n"
|
||||
"В I2P есть варианты реализации таких функций с помощью специальных "
|
||||
"приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего для "
|
||||
"обычного использования не готово."
|
||||
msgstr "По сравнению с I2P, Freenet имеет некоторые преимущества - это распределенное хранилище\nданных, чем I2P не является, позволяющее людям обмениваться данными, даже если оригинальный\nавтор более недоступен. Также сеть позволяет эффективно распределять данные. I2P сам по себе не имеет и не будет иметь такой функции. С другой стороны, здесь есть недостаток для пользователей, которые просто хотят анонимно общаться через веб-сайты, доски объявлений, программы файлообмена и т.д\nВ I2P есть варианты реализации таких функций с помощью специальных приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего для обычного использования не готово."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Тем не менее, даже не обращая внимание на проблемы реализации, есть "
|
||||
"определенные соображения\n"
|
||||
"об алгоритмах Freenet с точки зрения масштабирования и анонимности, в "
|
||||
"области эвристической маршрутизации внутри Freenet. Взаимодействие разных"
|
||||
" техник определенно может защитить от ряда атак, \n"
|
||||
"и, возможно, некоторые аспекты алгоритмов маршрутизации дают надежды на "
|
||||
"масштабирование. К сожалению, немногие из попыток анализа алгоритмов дали"
|
||||
" позитивные результаты, но надежда есть.\n"
|
||||
"В конце концов, Freenet предоставляет значительный уровень анонимности "
|
||||
"против атакующего, который не обладает достаточными для дальнейшего "
|
||||
"анализа ресурсами."
|
||||
msgstr "Тем не менее, даже не обращая внимание на проблемы реализации, есть определенные соображения\nоб алгоритмах Freenet с точки зрения масштабирования и анонимности, в области эвристической маршрутизации внутри Freenet. Взаимодействие разных техник определенно может защитить от ряда атак, \nи, возможно, некоторые аспекты алгоритмов маршрутизации дают надежды на масштабирование. К сожалению, немногие из попыток анализа алгоритмов дали позитивные результаты, но надежда есть.\nВ конце концов, Freenet предоставляет значительный уровень анонимности против атакующего, который не обладает достаточными для дальнейшего анализа ресурсами."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -122,26 +71,14 @@ msgstr "Сравнение I2P с другими проектами"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Существует много других хороших приложений и проектов в области анонимных"
|
||||
" коммуникаций, и I2P определенно обогащается их опытом. Это неполный\n"
|
||||
" список подобных ресурсов - у freehaven'а в \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"и в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\n"
|
||||
"эти списки полнее. Всего несколько систем имеет смысл сравнивать далее. \n"
|
||||
"Ниже перечислены страницы, посвященные сравнениям с этими системами:"
|
||||
msgstr "Существует много других хороших приложений и проектов в области анонимных коммуникаций, и I2P определенно обогащается их опытом. Это неполный\n список подобных ресурсов - у freehaven'а в \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nи в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\nэти списки полнее. Всего несколько систем имеет смысл сравнивать далее. \nНиже перечислены страницы, посвященные сравнениям с этими системами:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
@ -153,15 +90,9 @@ msgstr "Обсуждается на <a href=\"%(othernetworks)s\">страниц
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Содержимое этой страницы подлежит обновлению, обсуждению и оспариванию, и"
|
||||
" мы будем рады любым замечаниям и дополнениям.\n"
|
||||
"Вы можете посодействовать анализу, добавив <a href=\"%(trac)s\">новый "
|
||||
"тикет в Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
@ -178,251 +109,116 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Большая часть следующих разделов сильно устарела и не может быть точной.\n"
|
||||
"Для ознакомления с доступными сравнениями обратитесь к\n"
|
||||
"<a href=\"%(comparison)s\">основной странице сравнения сетей</a>.\n"
|
||||
"Вы можете посодействовать анализу, добавив\n"
|
||||
"<a href=\"%(trac)s\">новый тикет в Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
msgstr ""
|
||||
"RetroShare - это набор peer-to-peer приложений, работающих в \n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> сети. Каждый пир такой"
|
||||
" F2F \n"
|
||||
"сети устанавливает прямые IP-соединения только с проверенными пирами "
|
||||
"(\"друзьями\") после явного \n"
|
||||
"обмена сертификатами. Он может обнаружить непроверенные пиры (например, "
|
||||
"друзья друзей), \n"
|
||||
"но соединения с ними производятся только через пиры \"друзей\" для "
|
||||
"обеспечения конфиденциальности и анонимности."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr "RetroShare - это набор peer-to-peer приложений, работающих в \n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> сети. Каждый пир такой F2F \nсети устанавливает прямые IP-соединения только с проверенными пирами (\"друзьями\") после явного \nобмена сертификатами. Он может обнаружить непроверенные пиры (например, друзья друзей), \nно соединения с ними производятся только через пиры \"друзей\" для обеспечения конфиденциальности и анонимности."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
"RetroShare предназначен для построения частноой сети доверенных пиров, в "
|
||||
"то время как I2P предназначен быть крупной публичной анонимной сетью. "
|
||||
"Последние версии RetroShare имеют варианты запуска в качестве публичного "
|
||||
"\"даркнета\", используя I2P или Tor в качестве транспорта. Таким "
|
||||
"образом, все соединения \n"
|
||||
"анонимны и не требуют доверия для добавления новых \"друзей\"."
|
||||
msgstr "RetroShare предназначен для построения частноой сети доверенных пиров, в то время как I2P предназначен быть крупной публичной анонимной сетью. Последние версии RetroShare имеют варианты запуска в качестве публичного \"даркнета\", используя I2P или Tor в качестве транспорта. Таким образом, все соединения \nанонимны и не требуют доверия для добавления новых \"друзей\"."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix и Tarzan - это полностью распределенные точка-точка сети "
|
||||
"анонимных прокси-серверов, позволяющие людям организовывать соединения "
|
||||
"через смешанную сеть с низкими задержками.\n"
|
||||
"Morphmix включает интересные алгоритмы обхода коллизий и защиты от атаки "
|
||||
"Sybil, а Tarzan использует для этого недостаток IP-адресов. Два основных "
|
||||
"отличия таких систем от I2P связаны с <a href=\"%(threatmodel)s\">моделью"
|
||||
" угроз</a> I2P \n"
|
||||
"и их дизайнов выходящих узлов (в отличие от обеспечения анонимности и "
|
||||
"отправителя, и получателя). Для обоих систем доступны исходные коды, но "
|
||||
"нам не известно об их использовании за пределами научной деятельности."
|
||||
msgstr "Morphmix и Tarzan - это полностью распределенные точка-точка сети анонимных прокси-серверов, позволяющие людям организовывать соединения через смешанную сеть с низкими задержками.\nMorphmix включает интересные алгоритмы обхода коллизий и защиты от атаки Sybil, а Tarzan использует для этого недостаток IP-адресов. Два основных отличия таких систем от I2P связаны с <a href=\"%(threatmodel)s\">моделью угроз</a> I2P \nи их дизайнов выходящих узлов (в отличие от обеспечения анонимности и отправителя, и получателя). Для обоих систем доступны исходные коды, но нам не известно об их использовании за пределами научной деятельности."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion и Mixmaster являются сетями, поддерживающими анонимность "
|
||||
"электронной корреспонденции с очень сильной защитой.\n"
|
||||
"Программы обмена сообщениями с высокой скрытностью, работающие поверх I2P"
|
||||
"\n"
|
||||
"(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\n"
|
||||
"возможно, смогут показать достаточную сопротивляемость существующей "
|
||||
"модели угроз, в то же время удовлетворяя потребности пользователей по "
|
||||
"обмену сообщениями меньшей скрытности,\n"
|
||||
"обеспечивая гораздо лучшую анонимность.\n"
|
||||
"Поддержка высокой скрытности в самом I2P маршрутизаторе, возможно, будет "
|
||||
"реализована, а, возможно, и нет, в отдалённом будущем.\n"
|
||||
"Ещё слишком рано говорить, удовлетворяет ли I2P потребностям "
|
||||
"пользователей в экстремально защищённом обмене сообщениями."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion и Mixmaster являются сетями, поддерживающими анонимность электронной корреспонденции с очень сильной защитой.\nПрограммы обмена сообщениями с высокой скрытностью, работающие поверх I2P\n(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\nвозможно, смогут показать достаточную сопротивляемость существующей модели угроз, в то же время удовлетворяя потребности пользователей по обмену сообщениями меньшей скрытности,\nобеспечивая гораздо лучшую анонимность.\nПоддержка высокой скрытности в самом I2P маршрутизаторе, возможно, будет реализована, а, возможно, и нет, в отдалённом будущем.\nЕщё слишком рано говорить, удовлетворяет ли I2P потребностям пользователей в экстремально защищённом обмене сообщениями."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Как и в случае с Tor и Onion Routing, Mixminion и Mixmaster применяют "
|
||||
"подход на основе справочных директорий."
|
||||
msgstr "Как и в случае с Tor и Onion Routing, Mixminion и Mixmaster применяют подход на основе справочных директорий."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (Java Anonymous Proxy) - это сеть смешанных каскадов для анонимизации"
|
||||
" веб-запросов, и для этого применяется несколько централизованных узлов "
|
||||
"(участников каскада), которые смешивают и обрабатывают запросы "
|
||||
"пользователей через набор узлов (каскад) перед доставкой их в сеть.\n"
|
||||
"Задача, модель угроз и безопасности существенно отличаются от принятых в "
|
||||
"I2P, но те, кто не нуждается в значительном уровне анонимности, но не "
|
||||
"удовлетворен уровнем анонимности существующих анонимайзеров, могут "
|
||||
"рассмотреть этот вариант. Те, кто в зоне ответственности немецкого "
|
||||
"законодательства, должны учитывать опасность того, что German Federal "
|
||||
"Bureau of Criminal Investigation (FBCI) успешно провело <a "
|
||||
"href=\"%(url)s\">атаку</a> на эту сеть.\n"
|
||||
"Хотя методы атаки позже были признаны незаконными в немецком суде, факт "
|
||||
"успешного сбора данных стоит учитывать. Суды могут поменять свои решения "
|
||||
"по обстоятельствам и техническую возможность сбора информации "
|
||||
"правительством или агентствами нельзя сбрасывать со счетов)."
|
||||
msgstr "JAP (Java Anonymous Proxy) - это сеть смешанных каскадов для анонимизации веб-запросов, и для этого применяется несколько централизованных узлов (участников каскада), которые смешивают и обрабатывают запросы пользователей через набор узлов (каскад) перед доставкой их в сеть.\nЗадача, модель угроз и безопасности существенно отличаются от принятых в I2P, но те, кто не нуждается в значительном уровне анонимности, но не удовлетворен уровнем анонимности существующих анонимайзеров, могут рассмотреть этот вариант. Те, кто в зоне ответственности немецкого законодательства, должны учитывать опасность того, что German Federal Bureau of Criminal Investigation (FBCI) успешно провело <a href=\"%(url)s\">атаку</a> на эту сеть.\nХотя методы атаки позже были признаны незаконными в немецком суде, факт успешного сбора данных стоит учитывать. Суды могут поменять свои решения по обстоятельствам и техническую возможность сбора информации правительством или агентствами нельзя сбрасывать со счетов)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Обе эти системы работают на одном базовом механизме <a "
|
||||
"href=\"%(antnet)s\">маршрутизации</a>, добиваясь некоторой анонимности, "
|
||||
"предоставляя путь отказа при несложном, неорганизованном противнике. "
|
||||
"Используя antnet маршрутизацию, они сначала делают случайный проход или "
|
||||
"широковещательный запрос на поиск пира с нужными данными или адресами, а "
|
||||
"затем используют обратную связь для оптимизации найденного пути. Это "
|
||||
"нормально работает для приложений, которые собирают информацию о том, что"
|
||||
" другие пиры вокруг могут предложить - \"как у вас всех дела?\" против "
|
||||
"\"Алиса, привет, ты как?\". На выходе вы получаете локальный набор узлов,"
|
||||
" с которыми можно обмениваться файлами и поддерживать определенный "
|
||||
"уровень анонимности (хотя вы не имеете особого контроля над тем, кто "
|
||||
"будет в этой группе пиров)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Обе эти системы работают на одном базовом механизме <a href=\"%(antnet)s\">маршрутизации</a>, добиваясь некоторой анонимности, предоставляя путь отказа при несложном, неорганизованном противнике. Используя antnet маршрутизацию, они сначала делают случайный проход или широковещательный запрос на поиск пира с нужными данными или адресами, а затем используют обратную связь для оптимизации найденного пути. Это нормально работает для приложений, которые собирают информацию о том, что другие пиры вокруг могут предложить - \"как у вас всех дела?\" против \"Алиса, привет, ты как?\". На выходе вы получаете локальный набор узлов, с которыми можно обмениваться файлами и поддерживать определенный уровень анонимности (хотя вы не имеете особого контроля над тем, кто будет в этой группе пиров)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Тем не менее, этот алгоритм не очень хорошо масштабируется - если "
|
||||
"приложение хочет говорить с конкретным пиром, оно делает "
|
||||
"широковещательный запрос или случайный поиск (хотя, если поиск удался, "
|
||||
"antnet позволит оптимизировать связь). Это означает, что хотя эти сети "
|
||||
"работают на малом числе узлов, для большого числа узлов они не очень "
|
||||
"применимы при попытке связаться с конкретным пиром. Это не означает, что "
|
||||
"эти системы бесполезны, просто их применимость ограничена сценариями, где"
|
||||
" эти недостатки можно обработать другими средствами."
|
||||
msgstr "Тем не менее, этот алгоритм не очень хорошо масштабируется - если приложение хочет говорить с конкретным пиром, оно делает широковещательный запрос или случайный поиск (хотя, если поиск удался, antnet позволит оптимизировать связь). Это означает, что хотя эти сети работают на малом числе узлов, для большого числа узлов они не очень применимы при попытке связаться с конкретным пиром. Это не означает, что эти системы бесполезны, просто их применимость ограничена сценариями, где эти недостатки можно обработать другими средствами."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Это был проект с закрытым исходным кодом, нацеленный на иранских "
|
||||
"пользователей.\n"
|
||||
"Tor стал <a href=\"%(torpost)s\">хорошим примером того, что нужно "
|
||||
"инструменту обхода цензуры</a>.\n"
|
||||
"Однако, нужно сказать, что закрытый исходный код и нацеленность на "
|
||||
"аудиторию конкретной страны - это не лучшие идеи.\n"
|
||||
"I2P - это, конечно же, проект с открытым исходным кодом. Тем не менее, "
|
||||
"эти исходные коды, а также <a href=\"%(docs)s\">техническая "
|
||||
"документация</a> требуют гораздо большего внимания."
|
||||
msgstr "Это был проект с закрытым исходным кодом, нацеленный на иранских пользователей.\nTor стал <a href=\"%(torpost)s\">хорошим примером того, что нужно инструменту обхода цензуры</a>.\nОднако, нужно сказать, что закрытый исходный код и нацеленность на аудиторию конкретной страны - это не лучшие идеи.\nI2P - это, конечно же, проект с открытым исходным кодом. Тем не менее, эти исходные коды, а также <a href=\"%(docs)s\">техническая документация</a> требуют гораздо большего внимания."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -433,10 +229,8 @@ msgstr "Платные VPN-сервисы"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
"Вы можете посодействовать анализу, добавив\n"
|
||||
"<a href=\"%(trac)s\">новый тикет в Trac</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
msgid "Others"
|
||||
@ -464,17 +258,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor и Onion Routing - это анонимные сети прокси-серверов, позволяющие "
|
||||
"пользователям\n"
|
||||
"туннелировать данные через их сеть с низкими задержками. Два основных "
|
||||
"отличия Tor и I2P \n"
|
||||
"основаны на разнице в моделях угроз и дизайне выходных прокси-узлов (хотя"
|
||||
" Tor и поддерживает скрытые сервисы, как и I2P). Кроме того, Tor "
|
||||
"реализует централизованную точку для управления видимостью сети, а также "
|
||||
"для сбора статистики, в отличие от распределенной модели сети I2P, <a "
|
||||
"href=\"%(netdb)s\">базы сети</a> и <a href=\"%(peerselection)s\">выбора "
|
||||
"пира</a>."
|
||||
msgstr "Tor и Onion Routing - это анонимные сети прокси-серверов, позволяющие пользователям\nтуннелировать данные через их сеть с низкими задержками. Два основных отличия Tor и I2P \nоснованы на разнице в моделях угроз и дизайне выходных прокси-узлов (хотя Tor и поддерживает скрытые сервисы, как и I2P). Кроме того, Tor реализует централизованную точку для управления видимостью сети, а также для сбора статистики, в отличие от распределенной модели сети I2P, <a href=\"%(netdb)s\">базы сети</a> и <a href=\"%(peerselection)s\">выбора пира</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -487,14 +271,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"Функция выходных узлов в I2P/Tor обладает несколькими явными проблемами "
|
||||
"- \n"
|
||||
"как только данные покидают сеть, глобальные наблюдатели легко "
|
||||
"обеспечивают мониторинг этого трафика. Вдобавок, выходные узлы имеют "
|
||||
"доступ к незашифрованным данным в обе стороны, а также легко выявляются и"
|
||||
" подвержены разного рода атакам реального мира. И это все в добавление к "
|
||||
"обычным проблемам безопасности, которые мы знаем."
|
||||
msgstr "Функция выходных узлов в I2P/Tor обладает несколькими явными проблемами - \nкак только данные покидают сеть, глобальные наблюдатели легко обеспечивают мониторинг этого трафика. Вдобавок, выходные узлы имеют доступ к незашифрованным данным в обе стороны, а также легко выявляются и подвержены разного рода атакам реального мира. И это все в добавление к обычным проблемам безопасности, которые мы знаем."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -504,11 +281,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Тем не менее, многим людям не стоит беспокоиться на этот счет, т.к. они "
|
||||
"за пределами угроз модели. Они также вне (формальной) границы I2P (если "
|
||||
"людям нужно сделать выходной узел, они могут его сделать). На самом деле,"
|
||||
" ряд пользователей I2P в качестве выходного узла используют Tor."
|
||||
msgstr "Тем не менее, многим людям не стоит беспокоиться на этот счет, т.к. они за пределами угроз модели. Они также вне (формальной) границы I2P (если людям нужно сделать выходной узел, они могут его сделать). На самом деле, ряд пользователей I2P в качестве выходного узла используют Tor."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -518,9 +291,7 @@ msgstr "Сравнение терминологии Tor и I2P"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Хотя Tor и I2P во многом похожи, у них значительно отличается "
|
||||
"терминология."
|
||||
msgstr "Хотя Tor и I2P во многом похожи, у них значительно отличается терминология."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -664,21 +435,14 @@ msgstr "Преимущества Tor перед I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Значительно большая пользовательская база; Большее внимание со стороны "
|
||||
"науки и хакерского сообщества; выгоды от формальных исследований "
|
||||
"анонимности, сопротивления и производительности;\n"
|
||||
"известен неанонимный, видимый, связанный с университетом лидер"
|
||||
msgstr "Значительно большая пользовательская база; Большее внимание со стороны науки и хакерского сообщества; выгоды от формальных исследований анонимности, сопротивления и производительности;\nизвестен неанонимный, видимый, связанный с университетом лидер"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr ""
|
||||
"Уже разрешили ряд проблем масштабирования, к которым I2P еще просто не "
|
||||
"подошел"
|
||||
msgstr "Уже разрешили ряд проблем масштабирования, к которым I2P еще просто не подошел"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:85
|
||||
msgid "Has significant funding"
|
||||
@ -690,32 +454,24 @@ msgstr "Больше разработчиков, включая ряд опла
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Более устойчивый к блокировкам на уровне государств, благодаря транспорту"
|
||||
" поверх TLS и мостам (I2P имеет предложения по \"полностью закрытым "
|
||||
"путям\", но они еще не реализованы)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Более устойчивый к блокировкам на уровне государств, благодаря транспорту поверх TLS и мостам (I2P имеет предложения по \"полностью закрытым путям\", но они еще не реализованы)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Достаточно большая сеть, чтобы адаптироваться к блокировке и попыткам DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Разработан и оптимизирован для выхода трафика с большим числом выходных "
|
||||
"узлов"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Разработан и оптимизирован для выхода трафика с большим числом выходных узлов"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Лучше документация, есть исследования и спецификации,\n"
|
||||
"лучше веб-сайт, гораздо больше переведенных данных"
|
||||
msgstr "Лучше документация, есть исследования и спецификации,\nлучше веб-сайт, гораздо больше переведенных данных"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -729,17 +485,13 @@ msgstr "Клиенты Tor работают с очень небольшими
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Централизованный контроль уменьшает сложность каждого узла и может "
|
||||
"эффективно работать с атаками Sybil"
|
||||
msgstr "Централизованный контроль уменьшает сложность каждого узла и может эффективно работать с атаками Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Набор высокопроизводительных узлов обеспечивает высокую "
|
||||
"производительность и меньшие задержки"
|
||||
msgstr "Набор высокопроизводительных узлов обеспечивает высокую производительность и меньшие задержки"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -751,11 +503,9 @@ msgstr "Преимущества I2P перед Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Разработан и оптимизирован для работы скрытых сервисов, что гораздо "
|
||||
"быстрее, чем в Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Разработан и оптимизирован для работы скрытых сервисов, что гораздо быстрее, чем в Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -765,18 +515,13 @@ msgstr "Полностью распределенная и самооргани
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Пиры выбираются на основе постоянного профайлинга и замеров по "
|
||||
"производительности,\n"
|
||||
"нежели по объявленной пиром пропускной способности"
|
||||
msgstr "Пиры выбираются на основе постоянного профайлинга и замеров по производительности,\nнежели по объявленной пиром пропускной способности"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Пиры Floodfill (\"справочные сервера\") постоянно меняются и не обладают "
|
||||
"доверием, в отличие от явно прошитых в Tor"
|
||||
msgstr "Пиры Floodfill (\"справочные сервера\") постоянно меняются и не обладают доверием, в отличие от явно прошитых в Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@ -794,17 +539,13 @@ msgstr "Коммутирует пакеты вместо соединений"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"Явная прозрачная балансировка сообщений по многим пирам, в отличие от "
|
||||
"использования одного пути"
|
||||
msgstr "Явная прозрачная балансировка сообщений по многим пирам, в отличие от использования одного пути"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"Надежность и отказоустойчивость за счет поддержания нескольких "
|
||||
"параллельных туннелей и обеспечения ротации туннелей"
|
||||
msgstr "Надежность и отказоустойчивость за счет поддержания нескольких параллельных туннелей и обеспечения ротации туннелей"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -812,20 +553,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"соединения каждого пользователя масштабируются как O(1) вместо O(N) "
|
||||
"(например, Алиса держит 2 входящих туннеля, которые может использовать "
|
||||
"любой пир, с которым Алиса общается, а не держим по цепочке на каждый "
|
||||
"пир)"
|
||||
msgstr "соединения каждого пользователя масштабируются как O(1) вместо O(N) (например, Алиса держит 2 входящих туннеля, которые может использовать любой пир, с которым Алиса общается, а не держим по цепочке на каждый пир)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Односторонние туннели вместо двусторонних цепочек, удваивая число узлов, "
|
||||
"которые пир должен скомпрометировать, чтобы получить ту же информацию"
|
||||
msgstr "Односторонние туннели вместо двусторонних цепочек, удваивая число узлов, которые пир должен скомпрометировать, чтобы получить ту же информацию"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -839,11 +574,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Защита против детектирования клиентской активности, даже если\n"
|
||||
"атакующий участвует в туннеле, так как туннели используются не только для"
|
||||
" передачи сообщений, но и для работы NetDb, управления туннелями, "
|
||||
"проверки работоспособности туннелей)"
|
||||
msgstr "Защита против детектирования клиентской активности, даже если\nатакующий участвует в туннеле, так как туннели используются не только для передачи сообщений, но и для работы NetDb, управления туннелями, проверки работоспособности туннелей)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -851,34 +582,24 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"В I2P реализованы короткоживущие туннели, что уменьшает количество "
|
||||
"способов, которые атакующий может использовать для атаки, в отличие от "
|
||||
"цепочек в Tor'е, которые как правило живут долго. "
|
||||
msgstr "В I2P реализованы короткоживущие туннели, что уменьшает количество способов, которые атакующий может использовать для атаки, в отличие от цепочек в Tor'е, которые как правило живут долго. "
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"API I2P спроектированы под анонимность и безопасность, тогда как SOCKS "
|
||||
"сделан для функциональности"
|
||||
msgstr "API I2P спроектированы под анонимность и безопасность, тогда как SOCKS сделан для функциональности"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
msgstr ""
|
||||
"За редким исключением, все пиры участвуют в маршрутизации трафика для "
|
||||
"других"
|
||||
msgstr "За редким исключением, все пиры участвуют в маршрутизации трафика для других"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:195
|
||||
msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"Затраты на работу в полном режиме довольно низки, тогда как в Tor, если "
|
||||
"клиент сам по себе не требует много полосы, но они еще и не полностью "
|
||||
"используют сеть."
|
||||
msgstr "Затраты на работу в полном режиме довольно низки, тогда как в Tor, если клиент сам по себе не требует много полосы, но они еще и не полностью используют сеть."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -904,19 +625,14 @@ msgstr "... и, возможно, никогда не реализуемые, т
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Защита от количественного анализа сообщений за счет\n"
|
||||
"заворачивания нескольких сообщений в одно"
|
||||
msgstr "Защита от количественного анализа сообщений за счет\nзаворачивания нескольких сообщений в одно"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Защита от статистического анализа за счет добавления задержек на разных "
|
||||
"хопах\n"
|
||||
"(где задержки не зависят от других хостов)"
|
||||
msgstr "Защита от статистического анализа за счет добавления задержек на разных хопах\n(где задержки не зависят от других хостов)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -924,9 +640,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Разные стратегии имитовставки на уровне туннелей (например,\n"
|
||||
"создание туннеля, который будет обрабатывать 500 сообщений в минуту, \n"
|
||||
"где эндпойнт посылает случайные данные, если полезный трафик не "
|
||||
"передается и т.д.)"
|
||||
|
||||
msgstr "Разные стратегии имитовставки на уровне туннелей (например,\nсоздание туннеля, который будет обрабатывать 500 сообщений в минуту, \nгде эндпойнт посылает случайные данные, если полезный трафик не передается и т.д.)"
|
||||
|
@ -4566,7 +4566,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:72
|
||||
msgid "for"
|
||||
msgstr ""
|
||||
msgstr "для"
|
||||
|
||||
#: i2p2www/pages/site/docs/applications/git.html:74
|
||||
msgid "in order to obscure your local time zone."
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# Swedish translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Anders Nilsson <anders@devode.se>, 2015
|
||||
# cacapo <handelsehorisont@gmail.com>, 2015
|
||||
@ -12,18 +12,18 @@
|
||||
# Martin Svensson <digitalmannen@gmail.com>, 2014
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2021-11-29 20:19+0000\n"
|
||||
"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>\n"
|
||||
"Language-Team: Swedish (Sweden) "
|
||||
"(http://www.transifex.com/otf/I2P/language/sv_SE/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>, 2016-2017,2021\n"
|
||||
"Language-Team: Swedish (Sweden) (http://www.transifex.com/otf/I2P/language/sv_SE/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: sv_SE\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -44,16 +44,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -61,44 +56,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Det finns en stor forskargrupp som undersöker en mängd aspekter av\n"
|
||||
"anonymitet. För en aktuell och omfattande lista av relevanta "
|
||||
"publikationer, se \n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P drar nytta av mycket av forskingen kring Tor och onion routing, men "
|
||||
"det finns\n"
|
||||
"ringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar "
|
||||
"nätverket ger. Detta ger en unik möjlighet till ny forskning. \n"
|
||||
msgstr "\nDet finns en stor forskargrupp som undersöker en mängd aspekter av\nanonymitet. För en aktuell och omfattande lista av relevanta publikationer, se \n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P drar nytta av mycket av forskingen kring Tor och onion routing, men det finns\nringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar nätverket ger. Detta ger en unik möjlighet till ny forskning. \n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"En lista av tidigare kända artiklar om I2P finns tillgänglig <a "
|
||||
"href=\"%(papers)s\">här</a>."
|
||||
msgstr "En lista av tidigare kända artiklar om I2P finns tillgänglig <a href=\"%(papers)s\">här</a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -112,16 +90,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -132,27 +106,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -168,13 +132,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -182,10 +144,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -193,10 +153,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -208,32 +166,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -244,13 +194,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -260,35 +207,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -343,8 +278,7 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
@ -353,22 +287,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -395,8 +322,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
@ -409,8 +335,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -430,8 +355,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
@ -443,8 +368,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
@ -462,19 +387,18 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
@ -497,8 +421,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -507,10 +431,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
@ -545,19 +467,14 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -567,11 +484,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr "Om processen för incidentrespons i avsnitt III har slutförts:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
@ -623,8 +542,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
@ -632,13 +551,14 @@ msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
@ -647,8 +567,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
@ -659,33 +579,28 @@ msgstr "Om processen för incidentrespons i avsnitt III *inte* har slutförts:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
@ -700,7 +615,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
@ -729,15 +645,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
@ -747,10 +661,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
@ -760,8 +672,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
@ -798,4 +709,3 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
@ -8497,13 +8497,13 @@ msgstr "İletileri şifreleyebilmek için (tünelden göndermek ve hedefe ulaşm
|
||||
msgid ""
|
||||
"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
|
||||
"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
|
||||
msgstr ""
|
||||
msgstr "Yönelticiler, Yöneltici Bilgilerini doğrudan Ağ Veritabanına gönderirken, Kiralama Kümeleri giden tüneller üzerinden \ngönderilir (bir yönelticinin kendi Kiralama Kümesi ile ilişkilendirilmesini önlemek için Kiralama Kümelerinin anonim olarak gönderilmesi gerekir)."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:160
|
||||
msgid ""
|
||||
"We can combine the above concepts to build successful connections in the "
|
||||
"network."
|
||||
msgstr ""
|
||||
msgstr "Ağda başarılı bağlantılar kurmak için yukarıdaki kavramları birleştirebiliriz."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:164
|
||||
msgid ""
|
||||
@ -8511,19 +8511,19 @@ msgid ""
|
||||
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
|
||||
"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
|
||||
"that router to send the construction message onward, until the tunnel has been constructed."
|
||||
msgstr ""
|
||||
msgstr "Alice, kendi gelen ve giden tünellerini oluşturmak için Yöneltici Bilgilerini toplamak amacıyla Ağ Veritabanı üzerinde bir arama yapar.\nBöylece, tünellerinde sıçrama olarak kullanabileceği eşlerin listelerini toplar.\nDaha sonra ilk sıçramaya bir oluşturma iletisi gönderebilir, bir tünel oluşturulmasını isteyebilir ve \nyönelticiden tünel oluşturulana kadar oluşturma iletisini göndermesini isteyebilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:171
|
||||
msgid "Request information on other routers"
|
||||
msgstr ""
|
||||
msgstr "Diğer yönelticiler hakkında bilgi istenir"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:173
|
||||
msgid "Build tunnel using router information"
|
||||
msgstr ""
|
||||
msgstr "Yöneltici bilgileri kullanılarak tünel oluşturulur"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:175
|
||||
msgid "Figure 2: Router information is used to build tunnels."
|
||||
msgstr ""
|
||||
msgstr "Şekil 2: Tünelleri oluşturmak için kullanılan yöneltici bilgileri."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:178
|
||||
msgid ""
|
||||
@ -8541,7 +8541,7 @@ msgid ""
|
||||
"Alice may also cut down on the response time by bundling her most \n"
|
||||
"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
|
||||
"for it when he wants to reply, but this is optional."
|
||||
msgstr ""
|
||||
msgstr "Alice, Bob'a bir ileti göndermek istediğinde, önce Bob'un Kiralama Kümesini \nbulmak için Ağ Veritabanında bir arama yapar ve ona var olan gelen tünel \nağ geçitlerini öğrenir. Ardından, giden tünellerinden birini seçer ve iletiyi Bob'un \ngelen tünel ağ geçitlerinden birine iletmek için giden tünelin uç noktası için \nyönergelerle birlikte aşağıya gönderir. Giden tünel uç noktası bu yönergeleri \naldığında, iletiyi istendiği gibi iletir ve Bob'un gelen tünel ağ geçidi bunu aldığında, \ntünelden Bob'un yönelticisine iletilir. Alice, Bob'un iletiyi yanıtlayabilmesini istiyorsa, \nkendi hedefini iletinin bir parçası olarak açıkça iletmelidir. Bu, <a href=\"#app.streaming\">streaming</a> \nkitaplığında yapılan daha yüksek düzeyle bir katman sunularak yapılabilir.\nAlice ayrıca, Bob'un yanıt vermek istemesi durumunda Ağ Veritabanı araması \nyapmasına gerek kalmaması için en son Kiralama Kümesini iletiye katarak \nyanıt süresini kısaltabilir. Ancak bu seçenek isteğe bağlıdır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:195
|
||||
msgid "Connect tunnels using LeaseSets"
|
||||
@ -8569,7 +8569,7 @@ msgid ""
|
||||
"end to end communication between Alice and Bob, the garlic will be encrypted \n"
|
||||
"to the public key published in Bob's leaseSet, allowing the message to be \n"
|
||||
"encrypted without giving out the public key to Bob's own router."
|
||||
msgstr ""
|
||||
msgstr "Tünellerin kendileri, ağ içindeki eşlere karşı izinsiz açığa çıkmalarını önlemek için \nkatmanlı şifreleme kullansa da (ağ dışındaki eşlere izin açığa çıkmayı önlemek için \ntaşıma katmanının yaptığı gibi), giden tünel uç noktasından ve gelen tünel ağ geçidinden \ngelen iletiyi gizlemek için ek bir uçtan uca şifreleme katmanı eklemek gerekir. Bu \n\"<a href=\"#op.garlic\">garlicf şifrelemesi</a>\", Alice'in yönelticisinin birden çok iletiyi tek bir \n\"garlic iletisine\" sarmalaması ve belirli bir ortak anahtarla şifrelemesini sağlar. \nBöylece aracı eşler garlic içinde kaç ileti olduğunu, bu iletilerin ne söylediğini \nveya bu iletilerin nerede olduğunu ya da bu dişin hangi hedefe gönderildiğini belirleyemez. \nAlice ve Bob arasında tipik uçtan uca iletişim için, garlic Bob'un Kiralama Kümesinde \nyayınlanan ortak anahtarla şifrelenir. Böylece herkese açık anahtar Bob'un kendi \nyönelticisine verilmeden iletinin şifrelenmesi sağlanır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:215
|
||||
msgid ""
|
||||
@ -8579,7 +8579,7 @@ msgid ""
|
||||
"control and reliability needs, but most would be best served by reusing the \n"
|
||||
"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n"
|
||||
"based network."
|
||||
msgstr ""
|
||||
msgstr "Akılda tutulması gereken bir diğer önemli durum, I2P uygulamasının tamamen \nileti temelli olduğu ve yol boyunca bazı iletilerin kaybolabileceğidir. I2P kullanan \nuygulamalar, ileti odaklı arayüzleri kullanabilir ve kendi tıkanıklık denetimi ile \ngüvenilirlik gereksinimlerini karşılayabilir. Ancak çoğunun en iyi şekilde hizmet\nsağlaması için, I2P uygulamasını akış temelli bir ağ olarak görüntülemek için \nsağlanan <a href=\"#app.streaming\">akış</a> kitaplığını yeniden kullanması gerekir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:225
|
||||
msgid ""
|
||||
@ -8595,7 +8595,7 @@ msgid ""
|
||||
"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
|
||||
"all of the layers so that after all of the layers of per-hop encryption are \n"
|
||||
"added, the message arrives in the clear at the tunnel endpoint."
|
||||
msgstr ""
|
||||
msgstr "Hem gelen hem de giden tüneller benzer ilkelerle çalışır.\nTünel ağ geçidi, bir dizi tünel iletisi biriktirir ve sonunda bunları tünel aktarımı \niçin bir şeye önceden işler. Ardından, ağ geçidi önceden işlenmiş verileri şifreler \nve ilk sıçramaya iletir. Bu eş ve sonraki tünel katılımcıları, bir sonraki eşe iletmeden \nönce kopya olmadığını doğruladıktan sonra bir şifreleme katmanı ekler. Sonunda ileti, \niletilerin yeniden bölündüğü ve istendiği gibi iletildiği uç noktaya ulaşır. Fark, tüneli \noluşturanın yaptığı işte ortaya çıkar. Gelen tünellerde, oluşturucu uç noktadır ve \neklenen tüm katmanların şifresini çözer. Giden tünellerde oluşturucu ağ geçididir ve \ntüm katmanların şifresini önceden çözer. Her sıçrama için şifrelemenin tüm katmanları \neklendikten sonra, ileti tünel uç noktasına net bir şekilde ulaşır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:240
|
||||
msgid ""
|
||||
@ -8609,7 +8609,7 @@ msgid ""
|
||||
"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
|
||||
"anonymously, and depending upon untrusted peers to provide this information \n"
|
||||
"has its own serious anonymity implications."
|
||||
msgstr ""
|
||||
msgstr "İletileri iletmek için belirli eşlerin seçilmesi ve bunların özel sıralaması, hem I2P \nanonimliğini hem de başarım özelliklerini anlamak için önemlidir. Ağ veritabanının \n(aşağıda) hangi eşlerin sorgulanıp kayıtları depolayacağını seçmek için kendi ölçütleri \nolsa da, tünel oluşturucular ağdaki herhangi bir eşi herhangi bir sırayla (ve hatta \nherhangi bir sayıda) tek bir tünelde kullanabilir. Mükemmel gecikme ve kapasite \nverileri küresel olarak biliniyor olsaydı, seçim ve sıralama, istemci tehdit modelleri \nve belirli gereksinimleri tarafından yönlendirilirdi. Ne yazık ki, gecikme ve kapasite \nverilerinin anonim olarak toplanması önemsiz değildir ve bu bilgileri sağlamak için \ngüvenilmeyen eşlere bağlı olmanın anonimlik üzerinde ciddi etkileri vardır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:253
|
||||
msgid ""
|
||||
@ -8623,7 +8623,7 @@ msgid ""
|
||||
"and offers insufficient anonymity. I2P is instead working on offering a range \n"
|
||||
"of peer selection strategies, coupled with anonymity aware measurement code \n"
|
||||
"to organize the peers by their profiles."
|
||||
msgstr ""
|
||||
msgstr "Anonimlik açısından en basit yöntem, tüm ağdan rastgele eşler seçmek, \nbunları rastgele sıralamak ve bu eşleri sonsuza kadar bu sırayla kullanmak olur. \nBaşarım açısından bakıldığında, en basit yöntem, gerekli yedek kapasiteye sahip \nen hızlı eşleri seçmek, yükü şeffaf olarak devretmek için yükü farklı eşler arasında \ndağıtmak ve kapasite bilgileri değiştiğinde tüneli yeniden oluşturmak olur. İlki hem \nkırılgan hem de verimsiz iken, ikincisi için erişilemez bilgiler gerekir ve yetersiz \nanonimlik sunar. Bunun yerine I2P, eşleri profillerine göre düzenlemek için anonimlik \nfarkında ölçüm koduyla birleştirilmiş bir dizi eş seçim stratejisi sunmaya çalışır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:266
|
||||
msgid ""
|
||||
@ -8642,7 +8642,7 @@ msgid ""
|
||||
"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
|
||||
"and failing. The thresholds for those tiers are determined dynamically, and \n"
|
||||
"while they currently use fairly simple algorithms, alternatives exist."
|
||||
msgstr ""
|
||||
msgstr "Temel olarak, I2P etkileşimde bulunduğu eşlerin dolaylı davranışlarını sürekli olarak \nölçerek profillerini oluşturur. Örneğin, bir eş 1,3 saniyede bir ağ veritabanı aramasına \nyanıt verdiğinde, bu gidiş dönüş gecikmesi tüm yönelticilerin profillerine kaydedilerek, \nİstek ve yanıtın geçtiği iki tünelde (gelen ve giden) ve sorgulanan eşin profilinde yer alır. \nTaşıma katmanı gecikmesi veya tıkanıklık gibi doğrudan ölçümler, manipüle edilebildiği ve \nölçüm yönelticisi ile ilişkilendirilebileceğinden ve onları önemsiz saldırılara açık \nbırakabileceğinden profilin bir parçası olarak kullanılmaz. Bu profiller toplanırken, başarımını, \ngecikmesini, çok sayıda etkinliği işleme kapasitesini, şu anda aşırı yüklü olup olmadığını ve \nağ ile ne kadar bütünleşmiş olduğunu özetlemek için her biri üzerinde bir dizi hesaplama yapılır. \nDaha sonra bu hesaplamalar, yönelticileri hızlı ve yüksek kapasiteli, yüksek kapasiteli, sorunsuz \nve sorunlu olmak üzere dört düzeyde gruplamak için etkin eşleri karşılaştırmakta kullanılır. \nBu düzeylerin eşikleri devingen olarak belirlenir ve şu anda oldukça basit algoritmalar kullanır. \nAncak alternatifleri de vardır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:284
|
||||
msgid ""
|
||||
@ -8657,7 +8657,7 @@ msgid ""
|
||||
"router's top tier through predecessor and netDb harvesting attacks. In turn,\n"
|
||||
"several alternatives exist which, while not balancing the load as evenly, will\n"
|
||||
"address the attacks mounted by particular classes of adversaries."
|
||||
msgstr ""
|
||||
msgstr "Bu profil verileri kullanılarak, en basit uygun eş seçimi stratejisi, eşleri üst düzeyden \n(hızlı ve yüksek kapasiteli) rastgele seçmektir. Şu anda istemci tünelleri bu şekilde \ndağıtılmaktadır. Keşif tünelleri (ağ veritabanı ve tünel yönetimi için kullanılır) \"sorunsuz\" \ndüzeyinden ('daha iyi\" katmanlardaki yönelticileri de içerir) rastgele eşler seçer. \nEşler arası yönelticileri daha geniş bir şekilde örnekleme olanağı sağlar ve aslında \nrastgele <a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">tepe tırmanışı</a> ile eş seçimini iyileştirir. Ancak bu stratejiler, öncül \nve ağ veritabanı hasat saldırıları ile yönelticinin en üst düzeyindeki eşler hakkında bilgi \nsızdırır. Buna karşılık, yükü eşit olarak dengelememekle birlikte, belirli düşman sınıfları \ntarafından düzenlenen saldırılara karşı koyacak çeşitli alternatifler vardır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:298
|
||||
msgid ""
|
||||
@ -8678,7 +8678,7 @@ msgid ""
|
||||
"each time. This varies from the XOR based ordering in that the predecessor \n"
|
||||
"and successor of each peer is always the same, while the XOR only makes sure \n"
|
||||
"their order doesn't change."
|
||||
msgstr ""
|
||||
msgstr "Rastgele bir anahtar seçerek ve eşleri ondan XOR uzaklıklarına göre sıralayarak, \neşlerin başarısızlık oranına ve düzeyin karıştırılmasına göre öncül ve hasat saldırılarında \nsızdırılan bilgiler azaltılır. Ağ veritabanı hasat saldırılarıyla başa çıkmak için başka bir basit \nstrateji, gelen tünel ağ geçitlerini düzeltmek ve aynı zamanda tünellerdeki eşleri daha da \nrastgele hale getirmektir. İstemcinin bağlantı kurduğu düşmanlara yönelik önceki \nsaldırılarla başa çıkmak için giden tünel uç noktaları da sabit kalır. En çok maruz kalan \nnoktada hangi eşin düzeltileceğinin seçiminin elbette bir süre sınırı olmalıdır. Çünkü \nsonunda tüm eşler başarısız olur. Böylece diğer yönelticilerin sorunları arasında ölçülen \nortalama süreyi taklit etmek için tepkisel olarak ayarlanabilir ya da etkisel olarak önlenebilir. \nBu iki strateji, sırayla, sabit bir açık eş ve tüneller arasında bir XOR tabanlı sıralama kullanılarak \nbirleştirilebilir. Daha katı bir strateji, tam eşleri ve olası bir tünelin sıralamasını düzeltir. Yalnızca \nher biri aynı şekilde katılmayı kabul ederse tek tek eşler kullanılır. Bu yöntem, XOR tabanlı \nsıralamadan farklıdır, çünkü her bir eşin öncülü ve ardılı her zaman aynıdır. XOR ise yalnızca \nsıralarının değişmediğinden emin olur."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:318
|
||||
#, python-format
|
||||
@ -8687,7 +8687,7 @@ msgid ""
|
||||
"random strategy above, with XOR-based ordering. A \n"
|
||||
"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
|
||||
"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>."
|
||||
msgstr ""
|
||||
msgstr "Daha önce belirtildiği gibi, I2P şu anda (sürüm 0.8), XOR tabanlı sıralama \nile yukarıdaki düzeyli rastgele stratejiyi kullanıyor. Tünel işletimi, yönetimi \nve eş seçimi ile ilgili mekanizmalar hakkında ayrıntılı bir tartışma \n<a href=\"%(tunnelimpl)s\">tunnel teknik özelliklerinde</a> bulunabilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:326
|
||||
#, python-format
|
||||
@ -8695,7 +8695,7 @@ msgid ""
|
||||
"As mentioned earlier, I2P's netDb works to share the network's metadata.\n"
|
||||
"This is detailed in <a href=\"%(netdb)s\">the network database</a> page,\n"
|
||||
"but a basic explanation is available below."
|
||||
msgstr ""
|
||||
msgstr "Daha önce belirtildiği gibi, I2P ağ veritabanı ağın üst verilerini paylaşmak için çalışır.\nBu konu, <a href=\"%(netdb)s\">ağ veritabanı</a> sayfasında ayrıntılı olarak açıklanmıştır. \nBununla birlikte basit bir açıklamayı aşağıda bulabilirsiniz."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:332
|
||||
msgid ""
|
||||
@ -8703,7 +8703,7 @@ msgid ""
|
||||
"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
|
||||
"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
|
||||
"drops too low."
|
||||
msgstr ""
|
||||
msgstr "I2P kullanıcılarının belirli bir yüzdesi 'otomatik doldurma eşleri' olarak atanır.\nŞu anda, çok fazla bant genişliği olan ve yeterince hızlı I2P kurulumları, \nvar olan otomatik doldurma yönelticilerinin sayısı çok azaldığında kendilerini \notomatik doldurma yönelticisi olarak atar."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:339
|
||||
#, python-format
|
||||
@ -8715,23 +8715,23 @@ msgid ""
|
||||
"<a href=\"%(netdb)s#lookup\">security issue</a>.\n"
|
||||
"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
|
||||
"but will always answer by itself (if it has the requested data)."
|
||||
msgstr ""
|
||||
msgstr "Diğer I2P yönelticileri, otomatik doldurma yönelticilerine basit 'depolama' ve 'arama' \nsorguları göndererek verilerini ve arama bilgilerini depolar.\nBir otomatik doldurma yönelticisi bir 'depolama' sorgusu alırsa, bilgileri \n<a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algoritmasını</a> kullanarak diğer otomatik doldurma \nyönelticilerine yayar.\n'Arama' sorguları, şu anda önemli bir <a href=\"%(netdb)s#lookup\">güvenlik sorununu</a> \nönlemek için farklı şekilde çalışıyor.\nBir arama yapıldığında, otomatik doldurma yönelticisi aramayı diğer eşlere iletmez. \nAncak her zaman kendi kendine yanıt verir (istenilen verilere sahipse)."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:349
|
||||
msgid "Two types of information are stored in the network database."
|
||||
msgstr ""
|
||||
msgstr "Ağ veritabanında iki türde bilgi depolanır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:353
|
||||
msgid ""
|
||||
"A <b>RouterInfo</b> stores information on a specific I2P router and how to "
|
||||
"contact it"
|
||||
msgstr ""
|
||||
msgstr "<b>Yöneltici bilgileri</b> belirli bir I2P yönelticisi ve nasıl bağlantı kurulacağı hakkında bilgileri tutar."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:354
|
||||
msgid ""
|
||||
"A <b>LeaseSet</b> stores information on a specific destination (e.g. I2P "
|
||||
"website, e-mail server...)"
|
||||
msgstr ""
|
||||
msgstr "<b>Kiralama kümesi</b> belirli bir hedefin bilgilerini tutar (I2P web sitesi, e-posta sunucusu gibi)"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:356
|
||||
msgid ""
|
||||
@ -8740,7 +8740,7 @@ msgid ""
|
||||
"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
|
||||
"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n"
|
||||
"and detecting skew between routers at the transport layer."
|
||||
msgstr ""
|
||||
msgstr "Tüm bu bilgiler, yayınlayan tarafça imzalanır ve bilgileri kullanan veya depolayan herhangi bir I2P yönelticisi tarafından doğrulanır.\nEk olarak, eski kayıtların tutulmasını ve olası saldırıları önlemek için verilerde süre bilgisi bulunur.\nBu aynı zamanda I2P tarafından doğru zamanı korumak, ara sıra bazı SNTP sunucularını sorgulamak \n(varsayılan olarak <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin) ve aktarım katmanındaki yönelticiler arasındaki \nsapmayı algılamak için gerekli kodu bir araya getirmekte kullanılır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:364
|
||||
msgid "Some additional remarks are also important."
|
||||
@ -8755,7 +8755,7 @@ msgid ""
|
||||
"One could only want specific people to be able to reach a destination.\n"
|
||||
"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
|
||||
"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
|
||||
msgstr ""
|
||||
msgstr "Bir kişi yalnızca belirli kişilerin bir hedefe ulaşabilmesini isteyebilir.\nBu, hedef Ağ Veritabanında yayınlanabilir. Ancak hedefi başka yollarla iletmeniz gerekir.\nBir alternatif, 'Şifreli Kiralama Kümeleri'dir. Bu Kiralama Kümeleri yalnızca şifre çözme anahtarına erişimi olan kişiler tarafından çözülebilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:377
|
||||
msgid "Bootstrapping:"
|
||||
@ -8780,7 +8780,7 @@ msgid ""
|
||||
"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
|
||||
"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
|
||||
"Because of this, refinements to the netDb will be done in the next releases."
|
||||
msgstr ""
|
||||
msgstr "I2P ağındaki aramalar diğer ağ veritabanı yönelticilerine iletilmez.\nŞu anda, ağ çok büyük olmadığı için bu büyük bir sorun oluşturmaz.\nAncak ağ büyüdükçe, her ağ veritabanı yönelticisinde yöneltici bilgileri \nve kiralama kümesi dosyalarının tümü bulunmaz ve başarılı arama oranı düşer.\nBu nedenle, sonraki sürümlerde ağ veritabanında iyileştirmeler yapılacaktır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:398
|
||||
msgid ""
|
||||
@ -8789,7 +8789,7 @@ msgid ""
|
||||
"is the one who should receive a given message. The particulars of how routers \n"
|
||||
"communicate with other routers aren't critical - three separate protocols \n"
|
||||
"have been used at different points to provide those bare necessities."
|
||||
msgstr ""
|
||||
msgstr "Yönelticiler arasındaki iletişimde, iletişim kurulan yönelticinin belirli bir iletiyi \nalması gereken yöneltici olduğunu doğrulanırken, dış düşmanlara karşı gizlilik \nve bütünlük sağlanması gerekir. Yönelticilerin diğer yönelticilerle nasıl iletişim \nkurduğunun ayrıntıları kritik değildir. Temel gereksinimleri karşılamak için farklı \nnoktalarda üç ayrı iletişim kuralı kullanılmıştır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:406
|
||||
#, python-format
|
||||
@ -8799,12 +8799,12 @@ msgid ""
|
||||
"(as a number of routers will end up speaking with many others), I2P moved \n"
|
||||
"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n"
|
||||
"Semireliable UDP\", or \"SSU\"."
|
||||
msgstr ""
|
||||
msgstr "I2P, o zamandan beri devre dışı bırakılan TCP tabanlı bir iletişim kuralı ile başladı. \nDaha sonra, yüksek düzeyli iletişim gereksinimini karşılamak için (birkaç yöneltici \ndiğerleriyle konuşacağından), I2P, TCP tabanlı bir taşıyıcıdan \n<a href=\"%(ssu)s\">UDP tabanlı bir taşıyıcıya</a> - \"Güvenli yarı güvenilir UDP\" ya da \"SSU\" \nkullanmaya geçti."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:414
|
||||
#, python-format
|
||||
msgid "As described in the <a href=\"%(ssu)s\">SSU spec</a>:"
|
||||
msgstr ""
|
||||
msgstr "<a href=\"%(ssu)s\">SSU teknik özelliklerinde</a> belirtildiği şekilde:"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:418
|
||||
msgid ""
|
||||
@ -8815,7 +8815,7 @@ msgid ""
|
||||
"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
|
||||
"sufficient for home users. In addition, it should support techniques for addressing \n"
|
||||
"network obstacles, like most NATs or firewalls."
|
||||
msgstr ""
|
||||
msgstr "Bu iletişim kuralının amacı, güvenli, kimliği doğrulanmış, yarı güvenilir ve sıralanmamış \nileti aktarımını sağlamak ve üçüncü tarafların kolayca fark edemeyeceği kadar az miktarda \nveri ortaya çıkarmaktır. TCP dostu tıkanıklık denetiminin yanında yüksek düzeyli iletişimi \ndesteklerken PMTU algılamasını da içerebilir. Ev kullanıcıları için toplu verileri yeterli hızlarda \nverimli bir şekilde aktarabilmelidir. Ayrıca, NAT veya güvenlik duvarı gibi yaygın kullanılan \nağ engellerini ele alan teknikleri desteklemelidir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:428
|
||||
#, python-format
|
||||
@ -8827,7 +8827,7 @@ msgid ""
|
||||
"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
|
||||
"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
|
||||
"per connection issues of the old TCP transport."
|
||||
msgstr ""
|
||||
msgstr "SSU duyurulduktan sonra ve tıkanıklık çökmesi sorunlarının ortaya çıkmasıyla, \n<a href=\"%(ntcp)s\">NTCP</a> adlı yeni bir NIO tabanlı TCP aktarımı uygulandı. Yalnızca giden \nbağlantılar için varsayılan olarak etkindir. NAT/güvenlik duvarlarını gelen bağlantılara \nizin verecek şekilde yapılandıranlar ve /config.jsp üzerinde dış sunucu ve kapı \nnumarası (dyndns/etc tamam olan) belirtenler gelen bağlantıları alabilir. NTCP NIO \ntabanlı olduğundan, eski TCP aktarımındaki her bağlantı için 1 işlem sorunu yaşanmaz."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:438
|
||||
msgid ""
|
||||
@ -8836,7 +8836,7 @@ msgid ""
|
||||
"the connection and the relative value of these bids assigns the priority. \n"
|
||||
"Transports may reply with different bids, depending on whether there is already \n"
|
||||
"an established connection to the peer."
|
||||
msgstr ""
|
||||
msgstr "I2P, aynı anda birden fazla taşıyıcı kullanılmasını destekler. Giden bağlantı için \nbelirli bir taşıyıcı \"teklifler\" yoluyla seçilir. Bağlantı için her taşıyıcı teklifi ve bu \ntekliflerin göreli değeri önceliği belirler.\nTaşıyıcılar, eş ile daha önce kurulmuş bir bağlantı olup olmadığına bağlı olarak \nfarklı tekliflerle yanıt verebilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:446
|
||||
#, python-format
|
||||
@ -8846,7 +8846,7 @@ msgid ""
|
||||
"and inbound connections. Your firewall and your I2P router must be configured \n"
|
||||
"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n"
|
||||
"page</a>."
|
||||
msgstr ""
|
||||
msgstr "Geçerli uygulama, çoğu durumda giden bağlantılar için en yüksek öncelikli \ntaşıyıcı olarak NTCP değerlendirmesi yapar. SSU, hem giden hem de gelen \nbağlantılar için etkinleştirilir. Güvenlik duvarınız ve I2P yönelticiniz, gelen \nNTCP bağlantılarına izin verecek şekilde yapılandırılmalıdır. Ayrıntılı bilgi \nalmak için <a href=\"%(ntcp)s\">NTCP sayfasına</a> bakabilirsiniz."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:455
|
||||
msgid ""
|
||||
@ -8862,7 +8862,7 @@ msgid ""
|
||||
"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
|
||||
"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
|
||||
"(explained below)."
|
||||
msgstr ""
|
||||
msgstr "I2P üzerinde çeşitli düşmanlara karşı katmanlı savunma sağlamak için en düşük \ndüzeyde şifreleme öncülleri bir araya getirilir. En düşük düzeyde, yönelticiler arası \niletişim, aktarım katmanı güvenliği tarafından korunur - SSU, 2048 bitlik bir Diffie \naracılığıyla kısa ömürlü bir oturum anahtarı üzerinde anlaştıktan sonra her paketi \nhem açık IV hem de MAC (HMAC-MD5-128) ile AES256/CBC ile şifreler. Hellman \ndeğişimi, diğer yönelticinin DSA anahtarıyla istasyondan istasyona kimliği doğrular \nve ayrıca her ağ iletisinin yerel bütünlük denetimi için kendi karması vardır. \nAktarımlar üzerinden geçirilen <a href=\"#op.tunnels\">Tünel</a> iletileri, açık bir IV ile kendi katmanlı \nAES256/CBC şifrelemesini kullanır ve tünel uç noktasında ek bir SHA256 karması \nile doğrulanır. ElGamal/AES+SessionTags (aşağıda açıklanmıştır) ile şifrelenmiş \n\"garlic iletileri\" içinde çeşitli diğer iletiler aktarılır."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:470
|
||||
msgid "Garlic messages"
|
||||
@ -8882,7 +8882,7 @@ msgid ""
|
||||
"will wrap up that data message (alongside some other messages) into a garlic, \n"
|
||||
"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
|
||||
"leaseSet, and forward it through the appropriate tunnels."
|
||||
msgstr ""
|
||||
msgstr "Garlic iletileri, \"onion\" katmanlı şifrelemenin bir uzantısıdır ve tek bir iletinin içeriğinin \nbirden fazla \"diş\" içermesini sağlar - kendi aktarım yönergelerinin yanında tam olarak \nbiçimlendirilmiş iletiler. İleriler aksi durumda bilgiye erişimi olmaması gereken bir eşten \naçık metin olarak geçtiğinde, iletiler bir garlic iletisine samalanır. Örneğin, bir yöneltici \nbaşka bir yönelticiden bir tünele katılmasını istediğinde, istek bir garlic içine samalanır.\nBu garlic alıcı yönelticinin 2048bit ElGamal ortak anahtarına şifrelenir ve bir tünelden iletilir. \nBaşka bir örnek, bir istemci bir hedefe ileti göndermek istediğinde - göndericinin yönelticisi \nbu veri iletisini (diğer bazı iletilerin yanında bir garlic içine sarmalar. Bu garlic alıcının \nkiralama kümesinde yayınlanan 2048 bit ElGamal ortak anahtarı ile şifrelenir ve uygun \ntünellerden geçirilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:486
|
||||
msgid ""
|
||||
@ -8896,7 +8896,7 @@ msgid ""
|
||||
"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
|
||||
"to delivering them to the next hop in the tunnel, but those techniques are \n"
|
||||
"not currently used in the existing implementation."
|
||||
msgstr ""
|
||||
msgstr "Şifreleme katmanının içindeki her bir dişe eklenmiş \"yönergeler\", dişin yerel olarak, \nuzak bir yönelticiye ya da uzak bir yönelticideki uzak bir tünele aktarılmasını isteme \nyeteneğini bulundurur. Bu yönergelerde, bir eşin aktarımın belirli bir zaman veya koşul \nkarşılanana kadar ertelenmesini istemesini sağlayan alanlar vardır. Ancak bunlar \n<a href=\"#future.variablelatency\">önemsiz gecikmeler</a> dağıtılana kadar kabul edilmez. Garlic iletilerini tünel \noluşturmadan herhangi bir sayıda sıçrama ile açıkta yöneltmek ya da tünel iletilerini \ngarlic iletilerine sararak ve tüneldeki bir sonraki sekmeye iletmeden önce birkaç \nsıçramadan geçirerek yönlendirilebilir. Ancak bu teknikler şu andaki uygulama \nkullanılmıyor"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:499
|
||||
msgid "Session tags"
|
||||
@ -8909,7 +8909,7 @@ msgid ""
|
||||
"and integrity to garlic messages. As a whole, the combination is referred \n"
|
||||
"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
|
||||
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
|
||||
msgstr ""
|
||||
msgstr "Güvenilmez, sıralı olmayan ileti tabanlı bir sistem olan I2P, garlic iletilerinin veri gizliliği \nve bütünlüğü sağlamak için asimetrik ve simetrik şifreleme algoritmalarının basit bir \nkombinasyonunu kullanır. Bir bütün olarak, kombinasyon ElGamal/AES+Oturum etiketi \nolarak anılır. Ancak bu, basit 2048 bit ElGamal, AES256, SHA256 ve 32 bayt nonce \nkullanımını açıklamak için aşırı derecede ayrıntılı bir yoldur."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:539
|
||||
msgid ""
|
||||
@ -8920,7 +8920,7 @@ msgid ""
|
||||
"tags are getting through, and if there isn't sufficient communication it may \n"
|
||||
"drop the ones previously assumed to be properly delivered, reverting back \n"
|
||||
"to the full expensive ElGamal encryption."
|
||||
msgstr ""
|
||||
msgstr "Oturum etiketlerinin ömürleri kısadır. bu sürenin sonunda kullanılmazlarsa atılır. \nEk olarak, her bir anahtar için depolanan miktar ve anahtarların sayısı sınırlıdır.\nÇok fazla gelirse, yeni veya eski iletiler kaybolabilir Gönderici, oturum etiketlerini \nkullanan iletilerin geçip geçmediğini izler ve yeterli iletişim yoksa, daha önce \ndüzgün bir şekilde iletildiği varsayılanları bırakarak en pahalı ElGamal şifrelemesine \ngeri dönebilir."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:549
|
||||
msgid ""
|
||||
@ -8934,7 +8934,7 @@ msgid ""
|
||||
"cover against internal adversaries, though perhaps by limiting the amount \n"
|
||||
"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
|
||||
"there are no immediate plans to move towards these synchronized PRNGs."
|
||||
msgstr ""
|
||||
msgstr "Bir alternatif, yalnızca tek bir oturum etiketi iletmek ve bundan, hangi etiketlerin \nkullanılacağını veya bekleneceğini belirlemek için belirleyici bir PRNG tohumlanmasıdır. \nBu PRNG verisini gönderici ve alıcı arasında kabaca eşitlenmiş olarak tutularak (alıcı\nörneğin sonraki 50 etiketin bir penceresini önceden hesaplar), çok sayıda etiketi düzenli \nolarak gruplamanın yükü ortadan kaldırır ve ek seçenekler ile alan/zaman değiş tokuşu \nve belki de gerekli ElGamal şifrelemelerinin sayısını daha fazla azaltılması sağlanır.\nBununla birlikte, iç düşmanlara karşı gerekli korumayı sağlamak PRNG gücüne bağlı olacaktır. \nAncak belki de her bir PRNG kullanım sürelerini sınırlayarak, herhangi bir zayıflık en aza \nindirilebilir. Şu anda, eşitlenen PRNG yöntemine doğru ilerlemek için acil bir plan yok."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:562
|
||||
msgid "Future"
|
||||
@ -8945,7 +8945,7 @@ msgid ""
|
||||
"While I2P is currently functional and sufficient for many scenarios, there \n"
|
||||
"are several areas which require further improvement to meet the needs of those \n"
|
||||
"facing more powerful adversaries as well as substantial user experience optimization."
|
||||
msgstr ""
|
||||
msgstr "I2P şu anda birçok senaryo için işlevsel ve yeterli olsa da, daha güçlü rakiplerle \nkarşılaşanların gereksinimleri için daha fazla iyileştirme ve önemli kullanıcı deneyimi \niyileştirmesi gereken birkaç alan var."
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:569
|
||||
msgid "Restricted route operation"
|
||||
@ -9055,19 +9055,19 @@ msgstr "Zamanlama kısıtlamasından nasıl kurtulunur?"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:658
|
||||
msgid "Can we deal with the sessionTags more efficiently?"
|
||||
msgstr ""
|
||||
msgstr "Daha etkin bir sessionTags işlemesi sağlayabilir miyiz?"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:659
|
||||
msgid ""
|
||||
"What, if any, batching/mixing strategies should be made available on the "
|
||||
"tunnels?"
|
||||
msgstr ""
|
||||
msgstr "Tüneller için herhangi bir toplu işlem ya da karma stratejisi oluşturmalı mıyız?"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:660
|
||||
msgid ""
|
||||
"What other tunnel peer selection and ordering strategies should be "
|
||||
"available?"
|
||||
msgstr ""
|
||||
msgstr "Başka tünel eş seçimi ve sıralama stratejileri neler olabilir?"
|
||||
|
||||
#: i2p2www/pages/site/docs/how/tech-intro.html:663
|
||||
msgid "Similar systems"
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,26 +1,23 @@
|
||||
# Ukrainian translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Greg Koval <gregjsmith@gmx.com>, 2020
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-06-24 13:48+0000\n"
|
||||
"PO-Revision-Date: 2020-07-22 04:47+0000\n"
|
||||
"Last-Translator: Greg Koval <gregjsmith@gmx.com>\n"
|
||||
"Language-Team: Ukrainian (Ukraine) "
|
||||
"(http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 !="
|
||||
" 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n "
|
||||
"% 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9)"
|
||||
" || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3)\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: Greg Koval <gregjsmith@gmx.com>, 2020\n"
|
||||
"Language-Team: Ukrainian (Ukraine) (http://www.transifex.com/otf/I2P/language/uk_UA/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: uk_UA\n"
|
||||
"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 != 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n % 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9) || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -41,16 +38,11 @@ msgstr "Дослідження на мережі I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -58,17 +50,12 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -83,8 +70,7 @@ msgstr ""
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -98,16 +84,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -118,27 +100,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -154,13 +126,11 @@ msgstr "Загальні Рекомендації"
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -168,10 +138,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -179,10 +147,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -194,32 +160,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -230,13 +188,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -246,35 +201,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -326,59 +269,67 @@ msgstr "Пов'язані з мережею"
|
||||
msgid "Vulnerability Response Process"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:3
|
||||
msgid "January 2017"
|
||||
msgstr "Січень 2017"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
msgid "Point of Contact for Security Issues"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:14
|
||||
#: i2p2www/pages/site/research/vrp.html:22
|
||||
msgid "Security Response Team"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:16
|
||||
msgid "Only the following members have access to the security point of contact:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:25
|
||||
msgid "Incident Response"
|
||||
#: i2p2www/pages/site/research/vrp.html:24
|
||||
msgid ""
|
||||
"Echelon is the trusted security point-of-contact. He forwards e-mails to "
|
||||
"team members as appropriate."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:28
|
||||
msgid "Researcher submits report via one or both of two methods:"
|
||||
msgid "Incident Response"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:32
|
||||
msgid "Email"
|
||||
msgstr "Пошта"
|
||||
#: i2p2www/pages/site/research/vrp.html:31
|
||||
msgid "Researcher submits report via:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:42
|
||||
#, python-format
|
||||
msgid ""
|
||||
"In no more than %(limit)s working days, Response Team should gratefully\n"
|
||||
"In no more than %(limit)s working days, Response Team should\n"
|
||||
"respond to researcher using only encrypted methods."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -398,369 +349,357 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"If over email, Response Manager opens a HackerOne issue for new "
|
||||
"submission."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:74
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Effects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:83
|
||||
msgid "Effects individual routers, or must be carefully exploited."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:87
|
||||
msgid "Is not easily exploitable."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#: i2p2www/pages/site/research/vrp.html:89
|
||||
msgid "Respond according to the severity of the vulnerability:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:97
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:102
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:109
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:113
|
||||
#: i2p2www/pages/site/research/vrp.html:109
|
||||
msgid "MEDIUM and HIGH severities will require a Point Release."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:116
|
||||
#: i2p2www/pages/site/research/vrp.html:112
|
||||
msgid "LOW severities will be addressed in the next Regular Release."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
#: i2p2www/pages/site/research/vrp.html:118
|
||||
msgid "Response Team applies appropriate patch(es)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:126
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work "
|
||||
"in."
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:129
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
msgid "Patches are reviewed with the researcher."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:136
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
msgid "Vulnerability announcement is drafted."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:140
|
||||
#: i2p2www/pages/site/research/vrp.html:136
|
||||
msgid "Include severity of vulnerability."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:143
|
||||
#: i2p2www/pages/site/research/vrp.html:139
|
||||
msgid "Include systems/apps effected."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:146
|
||||
#: i2p2www/pages/site/research/vrp.html:142
|
||||
msgid "Include solutions (if any) if patch cannot be applied."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:150
|
||||
#: i2p2www/pages/site/research/vrp.html:146
|
||||
msgid "Release date is discussed."
|
||||
msgstr "Обговорюється дата для реліз."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
#: i2p2www/pages/site/research/vrp.html:152
|
||||
msgid ""
|
||||
"At release date, Response Team coordinates with developers to finalize "
|
||||
"update:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:160
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
msgid "Response Manager propagates the \"hotfix branch\" to trunk."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:163
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:166
|
||||
msgid "Proceed with the Point or Regular Release."
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:173
|
||||
#: i2p2www/pages/site/research/vrp.html:172
|
||||
msgid "Post-release Disclosure Process"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:176
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:180
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:184
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
msgid ""
|
||||
"Response Manager contacts researcher and asks if researcher wishes for "
|
||||
"credit."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:187
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:191
|
||||
#: i2p2www/pages/site/research/vrp.html:190
|
||||
msgid "Project name and URL."
|
||||
msgstr "Назва проекту та URL."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:194
|
||||
#: i2p2www/pages/site/research/vrp.html:193
|
||||
msgid "Versions known to be affected."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:197
|
||||
#: i2p2www/pages/site/research/vrp.html:196
|
||||
msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:200
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:203
|
||||
#: i2p2www/pages/site/research/vrp.html:202
|
||||
msgid "Type of vulnerability and its impact."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:206
|
||||
#: i2p2www/pages/site/research/vrp.html:205
|
||||
msgid "If already obtained or applicable, a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:209
|
||||
#: i2p2www/pages/site/research/vrp.html:208
|
||||
msgid "The planned, coordinated release date."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:212
|
||||
#: i2p2www/pages/site/research/vrp.html:211
|
||||
msgid ""
|
||||
"Mitigating factors (for example, the vulnerability is only exposed in "
|
||||
"uncommon, non-default configurations)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:215
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:218
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:223
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:226
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:234
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:246
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is *not* successfully "
|
||||
"completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:255
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:264
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:273
|
||||
#: i2p2www/pages/site/research/vrp.html:277
|
||||
msgid "Incident Analysis"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:276
|
||||
#: i2p2www/pages/site/research/vrp.html:280
|
||||
msgid "Isolate codebase"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:278
|
||||
#: i2p2www/pages/site/research/vrp.html:298
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
msgid "Problematic implementation of classes/libraries/functions, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:285
|
||||
#: i2p2www/pages/site/research/vrp.html:289
|
||||
msgid "Focus on apps/distro packaging, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:288
|
||||
#: i2p2www/pages/site/research/vrp.html:292
|
||||
msgid "Operator/config error, etc."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:296
|
||||
#: i2p2www/pages/site/research/vrp.html:300
|
||||
msgid "Auditing"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
#: i2p2www/pages/site/research/vrp.html:306
|
||||
msgid "Auditing of problem area(s) as discussed in point 1."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:305
|
||||
#: i2p2www/pages/site/research/vrp.html:309
|
||||
msgid "Generate internal reports and store for future reference."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:308
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:316
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:322
|
||||
#: i2p2www/pages/site/research/vrp.html:326
|
||||
msgid "Resolutions"
|
||||
msgstr "Вирішення"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:324
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:338
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
msgid "Continuous Improvement"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:346
|
||||
#: i2p2www/pages/site/research/vrp.html:349
|
||||
msgid ""
|
||||
"Response Team or designated person(s) should give a brief presentation, "
|
||||
"including:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:350
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
msgid "Areas of I2P affected by the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
msgid "Any network downtime or monetary cost (if any) of the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
msgid "Ways in which the incidents could have been avoided (if any)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
#: i2p2www/pages/site/research/vrp.html:362
|
||||
msgid "How effective this process was in dealing with the incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:365
|
||||
#: i2p2www/pages/site/research/vrp.html:368
|
||||
msgid "After the presentation, Response Team and developers should discuss:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:369
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
msgid "Potential changes to development processes to reduce future incidents."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
@ -1,28 +1,28 @@
|
||||
# Chinese translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# nobody <oiiu19@yahoo.com>, 2015
|
||||
# nobody <oiiu19@yahoo.com>, 2016
|
||||
# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2015
|
||||
# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2016
|
||||
# Scott Rhodes <starring169@gmail.com>, 2020
|
||||
# YFdyh000 <yfdyh000@gmail.com>, 2016
|
||||
# YFdyh000 <yfdyh000@gmail.com>, 2015-2016
|
||||
# yue gao <gaoyue@iie.ac.cn>, 2017
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2020-03-28 05:48+0000\n"
|
||||
"Last-Translator: Scott Rhodes <starring169@gmail.com>\n"
|
||||
"Language-Team: Chinese (China) "
|
||||
"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Scott Rhodes <starring169@gmail.com>, 2020\n"
|
||||
"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: zh_CN\n"
|
||||
"Plural-Forms: nplurals=1; plural=0;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -30,57 +30,37 @@ msgstr "I2P 相比 Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr "Freenet是一个完全分布式的P2P匿名发布网络,提供安全的数据存储方式,以及一些试图解决洪泛负载的方法。虽然Freenet的设计目的是分布式的数据存储,但是人们也在Freenet之上建立了一些应用程序,使得更通用的匿名通信成为可能,如静态网站和留言板等。"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a"
|
||||
" href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
|
||||
msgstr "相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -90,15 +70,11 @@ msgstr "I2P与其他项目的比较"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -113,10 +89,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -134,52 +108,38 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -187,19 +147,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -211,32 +167,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -245,36 +189,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -282,10 +213,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -299,7 +228,7 @@ msgstr "付费VPN服务"
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -434,7 +363,7 @@ msgstr "隐身服务"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Eepsite or Destination"
|
||||
msgid "I2P Site or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -505,13 +434,10 @@ msgstr "Tor 相对 I2P 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"大许多的用户群;在学术和黑客群体中得到较多关注;\n"
|
||||
"基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
|
||||
msgstr "大许多的用户群;在学术和黑客群体中得到较多关注;\n基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -527,29 +453,24 @@ msgstr "有更多的开发者,其中有些是全职的"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n"
|
||||
"(I2P 有“完全限制路由”的提案,但还没有实现)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n(I2P 有“完全限制路由”的提案,但还没有实现)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "足够大所以它已经适应了封锁和拒绝服务攻击"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "为出口流量设计和优化,有大量的出口节点"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"更好的文档,拥有正式文件和规范,\n"
|
||||
"更美观的网页,多许多的翻译"
|
||||
msgstr "更好的文档,拥有正式文件和规范,\n更美观的网页,多许多的翻译"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -581,8 +502,8 @@ msgstr "I2P 相对 Tor 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "专为隐藏服务设计和优化,在这方面比 Tor 快许多"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -599,9 +520,7 @@ msgstr "通过不断分析和比较性能,而不是根据目录声称的流量
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"种子节点(“目录服务器”)是持续变化并且不被信任的,\n"
|
||||
"而不是硬编码写入"
|
||||
msgstr "种子节点(“目录服务器”)是持续变化并且不被信任的,\n而不是硬编码写入"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@ -721,4 +640,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
# Chinese translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# bright hong <heathcliff2333@outlook.com>, 2020
|
||||
# xkimo_daeee <michael_ies@yahoo.com>, 2014
|
||||
@ -11,18 +11,18 @@
|
||||
# YFdyh000 <yfdyh000@gmail.com>, 2014,2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2021-05-05 16:50+0000\n"
|
||||
"Last-Translator: Scott Rhodes <starring169@gmail.com>\n"
|
||||
"Language-Team: Chinese (China) "
|
||||
"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: Scott Rhodes <starring169@gmail.com>, 2020-2021\n"
|
||||
"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: zh_CN\n"
|
||||
"Plural-Forms: nplurals=1; plural=0;\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -43,16 +43,11 @@ msgstr "关于I2P网络的学术研究"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr "I2P是一个特别的项目,但它在学术圈没有得到应有的关注。目前,大多数关于匿名性和“洋葱”路由的研究都是围绕Tor进行的,尽管这些文章对我们也有帮助,我们仍认为需要有围绕I2P的研究。这在保持网络的安全性和正确性以及对于启示未来更有影响力的开发中扮演了重要角色。"
|
||||
|
||||
@ -60,24 +55,14 @@ msgstr "I2P是一个特别的项目,但它在学术圈没有得到应有的关
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"有一个大型研究社区研究匿名性的方方面面。想寻找当前全面的论文列表,请参阅<a "
|
||||
"href=\"%(anonbib)s\">自由避风港匿名参考文献Free Haven Anonymity Bibliography</a>。\n"
|
||||
"I2P 得益于大量对 Tor 和洋葱路由的研究。但是,对I2P背后的理论以及网络做出的选择和权衡的研究几乎没有。这为原创研究提供了一个独特的机会。"
|
||||
"\n"
|
||||
msgstr "\n有一个大型研究社区研究匿名性的方方面面。想寻找当前全面的论文列表,请参阅<a href=\"%(anonbib)s\">自由避风港匿名参考文献Free Haven Anonymity Bibliography</a>。\nI2P 得益于大量对 Tor 和洋葱路由的研究。但是,对I2P背后的理论以及网络做出的选择和权衡的研究几乎没有。这为原创研究提供了一个独特的机会。\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
@ -90,12 +75,9 @@ msgstr "已知的已发表的有关 I2P 的论文在<a href=\"%(papers)s\">这
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"本页面希望概括出最急需的研究方面,对潜在研究人员的寄语,我们总的安全指导原则以及一堆你可以着手的开放性问题。\n"
|
||||
msgstr "\n本页面希望概括出最急需的研究方面,对潜在研究人员的寄语,我们总的安全指导原则以及一堆你可以着手的开放性问题。\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:40
|
||||
msgid "Notes to Researchers:"
|
||||
@ -107,16 +89,12 @@ msgstr "防御性研究"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr "我们认为所有关于I2P网络的研究都是有用的,且欢迎这样的研究,尽管如此,其中一些领域的研究比起别的更急需--主要在于防御性研究。许多人享受着想出对匿名软件的花式攻击方法,这种状况又被学校的奖励机制助长。尽管我们知道这不是研究人员的第一选择,我们仍期盼任何能够帮助强化网络的工作。"
|
||||
|
||||
@ -127,31 +105,19 @@ msgstr "攻性和分析测试"
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
"如果您决定做一个关于I2P的课题,一步步分析I2P网络,或解决大问题时,我们<b>恳切希望</b>您能与我们的开发团队<a "
|
||||
"href=\"%(contact)s\">交流您的想法</a>,越快越好。I2P在持续开发中,会有大量开发路线,所以您的问题可能已经被标记准备更新解决。极少数情况下您的测试可能与别的研究组重合,我们也会提前告诉您(当然了,在他们的允许下),或许能促成您与另一团队的合作。也有可能测试本身会严重损害网络或普通用户,开发团队会给您建议来减少风险,增加测试安全性。"
|
||||
msgstr "如果您决定做一个关于I2P的课题,一步步分析I2P网络,或解决大问题时,我们<b>恳切希望</b>您能与我们的开发团队<a href=\"%(contact)s\">交流您的想法</a>,越快越好。I2P在持续开发中,会有大量开发路线,所以您的问题可能已经被标记准备更新解决。极少数情况下您的测试可能与别的研究组重合,我们也会提前告诉您(当然了,在他们的允许下),或许能促成您与另一团队的合作。也有可能测试本身会严重损害网络或普通用户,开发团队会给您建议来减少风险,增加测试安全性。"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:71
|
||||
msgid "Research Ethics & Testing the Network"
|
||||
@ -165,13 +131,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -179,10 +143,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -190,10 +152,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -205,32 +165,24 @@ msgstr "使用测试网络攻击 I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -241,13 +193,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -257,35 +206,23 @@ msgstr "路由器家族配置"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -340,8 +277,7 @@ msgstr "漏洞报告流程"
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
@ -350,22 +286,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -392,8 +321,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
@ -406,8 +334,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -427,8 +354,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
@ -440,8 +367,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
@ -459,19 +386,18 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
@ -494,8 +420,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -504,10 +430,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
@ -542,19 +466,14 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -564,11 +483,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
@ -620,8 +541,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
@ -629,13 +550,14 @@ msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
@ -644,8 +566,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
@ -656,33 +578,28 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
@ -697,7 +614,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
@ -726,15 +644,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
@ -744,10 +660,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
@ -757,8 +671,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
@ -795,4 +708,3 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
@ -50,6 +50,6 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" || exit
|
||||
cd "$DIR" || exit
|
||||
|
||||
git pull origin $i2p_www_branch
|
||||
docker build $i2p_www_docker_build_args -t i2p-mirror/mirror.i2p.www$suffix .
|
||||
docker build $i2p_www_docker_build_args -t mirror.i2p.www$suffix .
|
||||
docker rm -f mirror.i2p.www$suffix
|
||||
docker run $i2p_www_docker_run_args --name mirror.i2p.www$suffix -p 0.0.0.0:$port:80 i2p-mirror/i2p.www$suffix $@
|
||||
docker run $i2p_www_docker_run_args --name mirror.i2p.www$suffix -p 0.0.0.0:$port:80 mirror.i2p.www$suffix $@
|
||||
|
Reference in New Issue
Block a user