From dc6608837506efc7cc21b227f305aec02eaa8266 Mon Sep 17 00:00:00 2001 From: str4d Date: Thu, 31 Jan 2013 11:40:21 +0000 Subject: [PATCH] Added translation tags to docs/how/threat-model --- i2p2www/pages/site/docs/how/threat-model.html | 857 +++++++++++------- 1 file changed, 506 insertions(+), 351 deletions(-) diff --git a/i2p2www/pages/site/docs/how/threat-model.html b/i2p2www/pages/site/docs/how/threat-model.html index 5ab111bf..09d3c402 100644 --- a/i2p2www/pages/site/docs/how/threat-model.html +++ b/i2p2www/pages/site/docs/how/threat-model.html @@ -1,65 +1,82 @@ {% extends "global/layout.html" %} -{% block title %}I2P's Threat Model{% endblock %} -{% block lastupdated %}November 2010{% endblock %} +{% block title %}{% trans %}I2P's Threat Model{% endtrans %}{% endblock %} +{% block lastupdated %}{% trans %}November 2010{% endtrans %}{% endblock %} {% block accuratefor %}0.8.1{% endblock %} {% block content %} -

What do we mean by "anonymous"?

+

{% trans %}What do we mean by "anonymous"?{% endtrans %}

-

Your level of anonymity can be described as "how hard it is for someone +

{% trans -%} +Your level of anonymity can be described as "how hard it is for someone to find out information you don't want them to know?" - who you are, where you are located, who you communicate with, or even when you communicate. "Perfect" anonymity is not a useful concept here - software will not make you indistinguishable from people that don't use computers or who are not on the Internet. Instead, we are working to provide sufficient anonymity to meet the real needs of whomever we can - from those simply browsing websites, to those exchanging -data, to those fearful of discovery by powerful organizations or states.

+data, to those fearful of discovery by powerful organizations or states. +{%- endtrans %}

-

The question of whether I2P provides sufficient anonymity for your +

{% trans -%} +The question of whether I2P provides sufficient anonymity for your particular needs is a hard one, but this page will hopefully assist in answering that question by exploring how I2P operates under various attacks -so that you may decide whether it meets your needs.

+so that you may decide whether it meets your needs. +{%- endtrans %}

-

We welcome further research and analysis on I2P's resistance to the threats described below. +

{% trans -%} +We welcome further research and analysis on I2P's resistance to the threats described below. More review of existing literature (much of it focused on Tor) and original -work focused on I2P is needed.

+work focused on I2P is needed. +{%- endtrans %}

-

Network Topology Summary

-

I2P builds off the ideas of many other -systems, but a few key points should be kept in mind when -reviewing related literature: