Updated translation strings

This commit is contained in:
str4d
2016-04-02 00:12:52 +00:00
parent a3e19f4d8f
commit 6f77172d1e
114 changed files with 44934 additions and 58210 deletions

View File

@@ -1,14 +1,14 @@
# Translations template for I2P.
# Copyright (C) 2015 ORGANIZATION
# Copyright (C) 2016 ORGANIZATION
# This file is distributed under the same license as the I2P project.
# FIRST AUTHOR <EMAIL@ADDRESS>, 2015.
# FIRST AUTHOR <EMAIL@ADDRESS>, 2016.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: I2P website\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2014-07-26 02:42+0000\n"
"POT-Creation-Date: 2016-04-02 00:09+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -21,14 +21,30 @@ msgstr ""
msgid "Academic Research"
msgstr ""
#: i2p2www/pages/site/research/index.html:4
#: i2p2www/pages/site/research/index.html:3
msgid "February 2016"
msgstr ""
#: i2p2www/pages/site/research/index.html:5
msgid ""
"Academic research and analysis of I2P is an important part of ensuring "
"that the software and network performs as expected and is safe for users "
"in hostile environments."
msgstr ""
#: i2p2www/pages/site/research/index.html:8
#: i2p2www/pages/site/research/index.html:9
#, python-format
msgid ""
"\n"
"Recent events have prompted anonymity projects to provide specific "
"guidelines\n"
"for responsible research.\n"
"We endorse the <a href=\"%(torg)s\">Tor Ethical Research Guidelines</a> "
"and incorporate them here.\n"
"Please follow the Tor guidelines when researching I2P as well.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:16
#, python-format
msgid ""
"\n"
@@ -46,24 +62,32 @@ msgid ""
"original research.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:18
#: i2p2www/pages/site/research/index.html:26
#, python-format
msgid ""
"A list of known published papers about I2P is available <a "
"href=\"%(papers)s\">here</a>."
msgstr ""
#: i2p2www/pages/site/research/index.html:22
#: i2p2www/pages/site/research/index.html:30
#, python-format
msgid ""
"\n"
"See also the <a href=\"%(torr)s\">Tor Research Home Page</a> for general "
"guidance and links.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:34
msgid "Testing Attacks on I2P"
msgstr ""
#: i2p2www/pages/site/research/index.html:24
#: i2p2www/pages/site/research/index.html:36
msgid ""
"I2P can be run as a separate test network by controlling the locations "
"that a new router reseeds from so that it only finds other test routers."
msgstr ""
#: i2p2www/pages/site/research/index.html:28
#: i2p2www/pages/site/research/index.html:40
msgid ""
"The standard mode of operation is to have one JVM per router instance; "
"hence running multiple copies of I2P on a single machine is inadvisable, "
@@ -73,13 +97,13 @@ msgid ""
" same JVM."
msgstr ""
#: i2p2www/pages/site/research/index.html:32
#: i2p2www/pages/site/research/index.html:44
msgid ""
"MultiRouter can be started from the i2p base directory by running the "
"below command."
msgstr ""
#: i2p2www/pages/site/research/index.html:37
#: i2p2www/pages/site/research/index.html:49
msgid ""
"Additionally, I2P can be started in a virtual network mode. This mode "
"disables all transports, allowing the router to be tested in isolation "
@@ -87,11 +111,11 @@ msgid ""
"<code>i2p.vmCommSystem=true</code> to the router.config before starting."
msgstr ""
#: i2p2www/pages/site/research/index.html:41
#: i2p2www/pages/site/research/index.html:53
msgid "Testing the Live I2P Network"
msgstr ""
#: i2p2www/pages/site/research/index.html:43
#: i2p2www/pages/site/research/index.html:55
#, python-format
msgid ""
"If you are planning on conducting research on the live I2P network, "
@@ -102,6 +126,40 @@ msgid ""
"countermeasures which could interfere with the test."
msgstr ""
#: i2p2www/pages/site/research/index.html:60
msgid "Router Family Configuration"
msgstr ""
#: i2p2www/pages/site/research/index.html:62
msgid ""
"As of release 0.9.25, I2P supports a router family configuration.\n"
"This provides researchers who run multiple routers with the means to "
"publicly identify those routers.\n"
"In turn, this helps the I2P project understand that these routers are not"
" running an attack on the network.\n"
"It also will prevent other routers from including multiple routers of the"
" family in a single tunnel,\n"
"which could lead to deanonymization.\n"
"Routers that appear to be colluding but do not have a declared family may"
" be assumed to\n"
"be an attack on the network, and may be blocked.\n"
"The best way to ensure the success of your research project is to work "
"with us."
msgstr ""
#: i2p2www/pages/site/research/index.html:73
msgid ""
"A router family shares a private key so that participation in the family "
"cannot be spoofed.\n"
"To configure a router family, click on the 'I2P Internals' link in the "
"router console,\n"
"and then on the 'Family' tab.\n"
"Follow the instructions there to generate the private key for the first "
"router in the family.\n"
"Then, export the key from that router, and import it to other members of "
"the family."
msgstr ""
#: i2p2www/pages/site/research/questions.html:2
msgid "Open research questions"
msgstr ""