Updated translations

This commit is contained in:
str4d
2018-09-12 12:18:57 +00:00
parent 0f0fd000e3
commit 30b922eb9f
161 changed files with 281876 additions and 134680 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -1,29 +1,27 @@
# Translations template for I2P.
# French translations for I2P.
# Copyright (C) 2018 ORGANIZATION
# This file is distributed under the same license as the I2P project.
#
#
# Translators:
# bassmax, 2015
# Boxoa590, 2013
# AO French coordinator <ao@localizationlab.org>, 2017-2018
# magma <magma@mail.i2p>, 2011
# Boxoa590, 2013
# syl_, 2013,2015-2016
# Towinet, 2013-2016
msgid ""
msgstr ""
"Project-Id-Version: I2P\n"
"Project-Id-Version: I2P\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
"PO-Revision-Date: 2018-08-24 11:51+0000\n"
"Last-Translator: zzzi2p\n"
"Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 1.3\n"
"Language: fr\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#: i2p2www/pages/site/comparison/freenet.html:2
msgid "I2P Compared to Freenet"
@@ -31,39 +29,94 @@ msgstr "I2P comparé à Freenet"
#: i2p2www/pages/site/comparison/freenet.html:8
msgid ""
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
"secure ways to store data, as well as some approaches attempting to address the loads\n"
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
"built applications on top of it to do more generic anonymous communication, such as \n"
"Freenet is a fully distributed, peer to peer anonymous publishing "
"network, offering \n"
"secure ways to store data, as well as some approaches attempting to "
"address the loads\n"
"of a flash flood. While Freenet is designed as a distributed data store,"
" people have\n"
"built applications on top of it to do more generic anonymous "
"communication, such as \n"
"static websites and message boards."
msgstr "Freenet est entièrement distribué, cest un réseau pair à pair de publication anonyme, offrant\ndes moyens sûrs pour stocker des données, ainsi que des approches qui tentent de répondre aux charges\ndune crue éclair. Alors que Freenet est conçu comme un magasin de données distribuées, des gens ont\nconstruit des applications par dessus celui-ci afin de faire de la communication anonyme plus générique, tels\nque des sites web statiques et des forums électroniques."
msgstr ""
"Freenet est entièrement distribué, cest un réseau pair à pair de "
"publication anonyme, offrant\n"
"des moyens sûrs pour stocker des données, ainsi que des approches qui "
"tentent de répondre aux charges\n"
"dune crue éclair. Alors que Freenet est conçu comme un magasin de "
"données distribuées, des gens ont\n"
"construit des applications par dessus celui-ci afin de faire de la "
"communication anonyme plus générique, tels\n"
"que des sites web statiques et des forums électroniques."
#: i2p2www/pages/site/comparison/freenet.html:16
#, python-format
msgid ""
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
"store, while I2P is not, allowing people to retrieve the content published by others \n"
"even when the publisher is no longer online. In addition, it should be able to \n"
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
"this functionality. On the other hand, there is overlap for users who simply want to \n"
"communicate with each other anonymously through websites, message boards, file sharing\n"
"programs, etc. There have also been some attempts to develop a distributed data \n"
"Compared to I2P, Freenet offers some substantial benefits - it is a "
"distributed data\n"
"store, while I2P is not, allowing people to retrieve the content "
"published by others \n"
"even when the publisher is no longer online. In addition, it should be "
"able to \n"
"distribute popular data fairly efficiently. I2P itself does not and will"
" not provide \n"
"this functionality. On the other hand, there is overlap for users who "
"simply want to \n"
"communicate with each other anonymously through websites, message boards,"
" file sharing\n"
"programs, etc. There have also been some attempts to develop a "
"distributed data \n"
"store to run on top of I2P,\n"
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
"but nothing is yet ready for general use."
msgstr "Comparé à I2P, Freenet offre des avantages considérables - cest un magasin de données distribuées,\ntandis que I2P ne lest pas, ce qui permet aux personnes de récupérer les contenus publiés par les autres\nmême lorsque léditeur nest plus en ligne. En outre, il devrait être en mesure de\ndistribuer des données populaires assez efficacement. I2P par lui-même ne fait pas et ne fournira pas\ncette fonctionnalité. Dautre part, il existe un chevauchement pour les utilisateurs qui veulent simplement\ncommuniquer les uns avec les autres de manière anonyme par les sites web, forums, logiciels de partage de fichiers,\netc. Il y a aussi eu des tentatives pour développer un magasin de données distribuées\ncapable de fonctionner par dessus I2P\n(plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>),\nmais rien nest encore prêt pour une utilisation générale."
msgstr ""
"Comparé à I2P, Freenet offre des avantages considérables - cest un "
"magasin de données distribuées,\n"
"tandis que I2P ne lest pas, ce qui permet aux personnes de récupérer les"
" contenus publiés par les autres\n"
"même lorsque léditeur nest plus en ligne. En outre, il devrait être en "
"mesure de\n"
"distribuer des données populaires assez efficacement. I2P par lui-même ne"
" fait pas et ne fournira pas\n"
"cette fonctionnalité. Dautre part, il existe un chevauchement pour les "
"utilisateurs qui veulent simplement\n"
"communiquer les uns avec les autres de manière anonyme par les sites web,"
" forums, logiciels de partage de fichiers,\n"
"etc. Il y a aussi eu des tentatives pour développer un magasin de données"
" distribuées\n"
"capable de fonctionner par dessus I2P\n"
"(plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>),\n"
"mais rien nest encore prêt pour une utilisation générale."
#: i2p2www/pages/site/comparison/freenet.html:29
msgid ""
"However, even ignoring any implementations issues, there are some concerns \n"
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
"However, even ignoring any implementations issues, there are some "
"concerns \n"
"about Freenet's algorithms from both a scalability and anonymity "
"perspective, owing \n"
"largely to Freenet's heuristic driven routing. The interactions of "
"various techniques \n"
"certainly may successfully deter various attacks, and perhaps some "
"aspects of the \n"
"routing algorithms will provide the hoped for scalability. "
"Unfortunately, not much\n"
"analysis of the algorithms involved has resulted in positive results, but"
" there is still\n"
"hope. At the very least, Freenet does provide substantial anonymity "
"against an attacker\n"
"who does not have the resources necessary to analyze it further."
msgstr "Cependant, même sans tenir compte des questions relatives aux mises en œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois sur lévolutivité et la perspective danonymat, en raison en grande partie du mode de routage de Freenet, axé heuristique. Les interactions des différentes techniques peuvent certainement réussir à dissuader diverses attaques, et peut-être que certains aspects des algorithmes de routage peuvent faire espérer de lévolutivité. Malheureusement, peu danalyses des algorithmes concernés ont abouti à des résultats positifs, mais il reste encore de lespoir. À tout le moins, Freenet fournit un anonymat substantiel contre un assaillant qui naurait pas les ressources nécessaires pour lanalyser davantage."
msgstr ""
"Cependant, même sans tenir compte des questions relatives aux mises en "
"œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois"
" sur lévolutivité et la perspective danonymat, en raison en grande "
"partie du mode de routage de Freenet, axé heuristique. Les interactions "
"des différentes techniques peuvent certainement réussir à dissuader "
"diverses attaques, et peut-être que certains aspects des algorithmes de "
"routage peuvent faire espérer de lévolutivité. Malheureusement, peu "
"danalyses des algorithmes concernés ont abouti à des résultats positifs,"
" mais il reste encore de lespoir. À tout le moins, Freenet fournit un "
"anonymat substantiel contre un assaillant qui naurait pas les ressources"
" nécessaires pour lanalyser davantage."
#: i2p2www/pages/site/comparison/index.html:2
msgid "Comparing I2P to other projects"
@@ -71,28 +124,49 @@ msgstr "I2P comparé à dautres projets"
#: i2p2www/pages/site/comparison/index.html:4
msgid ""
"There are a great many other applications and projects working on anonymous \n"
"communication and I2P has been inspired by much of their efforts. This is not \n"
"There are a great many other applications and projects working on "
"anonymous \n"
"communication and I2P has been inspired by much of their efforts. This "
"is not \n"
"a comprehensive list of anonymity resources - both freehaven's \n"
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
"Bibliography</a>\n"
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
"projects</a>\n"
"serve that purpose well. That said, a few systems stand out for further\n"
"comparison. The following have individual comparison pages:"
msgstr "Il existe un grand nombre dautres applications et de projets travaillant sur les communications anonymes et I2P sen est largement inspiré. Cette liste est loin dêtre exhaustive concernant le thème de lanonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent dailleurs dune page dédiée :"
msgstr ""
"Il existe un grand nombre dautres applications et de projets travaillant"
" sur les communications anonymes et I2P sen est largement inspiré. Cette"
" liste est loin dêtre exhaustive concernant le thème de lanonymat (<a "
"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
"Bibliography</a> de Freehaven\n"
"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à "
"GNUnet servent à celà). \n"
"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les "
"suivants disposent dailleurs dune page dédiée :"
#: i2p2www/pages/site/comparison/index.html:20
#, python-format
msgid ""
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
"networks page:</a>"
msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>"
msgstr ""
"Ceux qui suivent sont discuté sur la page <a "
"href=\"%(othernetworks)s\">autres réseaux</a>"
#: i2p2www/pages/site/comparison/index.html:33
#, python-format
msgid ""
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new ticket on Trac</a>."
msgstr "Le contenu de cette page est soumis à mises à jour, discussions et conflits, et nous accueillons avec plaisir les commentaires et ajouts.\nVous pouvez nous faire part de votre analyse en saisissant un <a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
"The content of this page is subject to update, discussion and dispute, "
"and we welcome comments and additions.\n"
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
"ticket on Trac</a>."
msgstr ""
"Le contenu de cette page est soumis à mises à jour, discussions et "
"conflits, et nous accueillons avec plaisir les commentaires et ajouts.\n"
"Vous pouvez nous faire part de votre analyse en saisissant un <a "
"href=\"%(trac)s\">nouveau ticket dans Trac</a>."
#: i2p2www/pages/site/comparison/other-networks.html:2
msgid "I2P Compared to Other Anonymous Networks"
@@ -110,115 +184,246 @@ msgid ""
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
"You may contribute an analysis by entering a\n"
"<a href=\"%(trac)s\">new ticket on Trac</a>."
msgstr "La plupart des sections suivantes sont assez vieilles et peuvent ne pas être précises.\nPour une vue densemble des comparaisons disponibles, voir la\n<a href=\"%(comparison)s\">page de comparaisons réseau principale</a>.\nVous pouvez également nous faire part de votre analyse en créant un\n<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
msgstr ""
"La plupart des sections suivantes sont assez vieilles et peuvent ne pas "
"être précises.\n"
"Pour une vue densemble des comparaisons disponibles, voir la\n"
"<a href=\"%(comparison)s\">page de comparaisons réseau principale</a>.\n"
"Vous pouvez également nous faire part de votre analyse en créant un\n"
"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
#: i2p2www/pages/site/comparison/other-networks.html:29
#, python-format
msgid ""
"RetroShare is a set of peer-to-peer applications running in a\n"
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
"such F2F \n"
"network makes direct IP connections only to authenticated peers "
"(\"friends\") after explicit \n"
"certificates exchange. It can discover unauthenticated peers (e.g. "
"friends of friends), \n"
"but connections to them are relayed over \"friend\" peers for providing "
"privacy and anonymity."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:37
msgid ""
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
"RetroShare is designed to build a private network of trusted peers, while"
" I2P is designed \n"
"to be a large-scaled public anonymous network. Recent versions of "
"RetroShare have options to run \n"
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
"connections are \n"
"anonymized and no trust is required for adding new \"friends\"."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:48
#, python-format
msgid ""
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
"mix network. Morphmix includes some very interesting collusion detection \n"
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
" \n"
"anonymizing proxies, allowing people to tunnel out through the low "
"latency \n"
"mix network. Morphmix includes some very interesting collusion detection"
" \n"
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
"IP\n"
"addresses to accomplish the same. The two primary differences between \n"
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
"and their out-proxy design (as opposed to providing both sender and receiver \n"
"anonymity). There is source code available to both systems, but we are not aware \n"
"these systems and I2P are related to I2P's <a "
"href=\"%(threatmodel)s\">threat model</a> \n"
"and their out-proxy design (as opposed to providing both sender and "
"receiver \n"
"anonymity). There is source code available to both systems, but we are "
"not aware \n"
"of their use outside of academic environments."
msgstr "Morphmix et Tarzan sont tous les deux des réseaux pair-à-pair de mandataires danonymisation entièrement distribués, permettant aux utilisateurs de tunnelliser vers lextérieur par le réseau de mélange à latence faible. Morphmix comportent des algorithmes très intéressants de détection de collusion et des défenses contre les Sybil, tandis que Tarzan fait appel à la rareté dadresses IP pour accomplir la même chose. Les deux principales différences entre ces systèmes et I2P sont liées au <a href=\"%(threatmodel)s\">modèle de menace</a> dI2P et à leur conception de mandataire sortant (au lieu de fournir de lanonymat à la fois à lémetteur et au destinataire). Le code source est offert pour les deux systèmes, mais nous ne sommes pas au courant dune utilisation en dehors des milieux universitaires."
msgstr ""
"Morphmix et Tarzan sont tous les deux des réseaux pair-à-pair de "
"mandataires danonymisation entièrement distribués, permettant aux "
"utilisateurs de tunnelliser vers lextérieur par le réseau de mélange à "
"latence faible. Morphmix comportent des algorithmes très intéressants de "
"détection de collusion et des défenses contre les Sybil, tandis que "
"Tarzan fait appel à la rareté dadresses IP pour accomplir la même chose."
" Les deux principales différences entre ces systèmes et I2P sont liées au"
" <a href=\"%(threatmodel)s\">modèle de menace</a> dI2P et à leur "
"conception de mandataire sortant (au lieu de fournir de lanonymat à la "
"fois à lémetteur et au destinataire). Le code source est offert pour les"
" deux systèmes, mais nous ne sommes pas au courant dune utilisation en "
"dehors des milieux universitaires."
#: i2p2www/pages/site/comparison/other-networks.html:172
#, python-format
msgid ""
"\n"
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
"Mixminion and Mixmaster are networks to support anonymous email against a"
" very\n"
"powerful adversary.\n"
"High-latency messaging applications running on top of I2P\n"
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
"may perhaps prove adequate to meet the threat\n"
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
"model of those adversaries, while running in parallel along side the "
"needs of low latency users, to provide\n"
"a significantly larger anonymity set.\n"
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
msgstr "\nMixminion et Mixmaster sont des réseaux pour offrir un système de courriel anonyme contre des adversaires très puissants.\nLes applications de messagerie à latence élevée fonctionnant sur I2P (par exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se révéler adéquates pour répondre au modèle de menace de ces adversaires, en sexécutant simultanément aux besoins des utilisateurs à latence faible, pour fournir un jeu danonymat considérablement plus important.\nLa prise en charge dune latence élevée dans le routeur I2P même pourrait ou pas être ajoutée dans une version future éloignée.\nIl est trop tôt pour dire si I2P répondra aux besoins dutilisateurs exigeant une protection extrême pour le courriel."
"High-latency support within the I2P router itself may or may not be added"
" in a distant future release.\n"
"It is too early to say if I2P will meet the needs of users requiring "
"extreme protection for email."
msgstr ""
"\n"
"Mixminion et Mixmaster sont des réseaux pour offrir un système de "
"courriel anonyme contre des adversaires très puissants.\n"
"Les applications de messagerie à latence élevée fonctionnant sur I2P (par"
" exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se "
"révéler adéquates pour répondre au modèle de menace de ces adversaires, "
"en sexécutant simultanément aux besoins des utilisateurs à latence "
"faible, pour fournir un jeu danonymat considérablement plus important.\n"
"La prise en charge dune latence élevée dans le routeur I2P même pourrait"
" ou pas être ajoutée dans une version future éloignée.\n"
"Il est trop tôt pour dire si I2P répondra aux besoins dutilisateurs "
"exigeant une protection extrême pour le courriel."
#: i2p2www/pages/site/comparison/other-networks.html:184
msgid ""
"As with Tor and Onion Routing, \n"
"both Mixminion and Mixmaster take the directory based approach as well."
msgstr "Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée sur un répertoire."
msgstr ""
"Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée"
" sur un répertoire."
#: i2p2www/pages/site/comparison/other-networks.html:194
#, python-format
msgid ""
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
"proxying out onto the web. The scope, threat model, and security is substantially \n"
"different from I2P, but for those who don't require significant anonymity but still\n"
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
"web requests,\n"
"and as such it has a few centralized nodes (participants in the cascade) "
"that blend\n"
"and mix requests from clients through the sequence of nodes (the cascade)"
" before \n"
"proxying out onto the web. The scope, threat model, and security is "
"substantially \n"
"different from I2P, but for those who don't require significant anonymity"
" but still\n"
"are not satisfied with an Anonymizer-like service, JAP is worth "
"reviewing. One\n"
"caution to note is that anyone under the jurisdiction of the German "
"courts may want\n"
"to take care, as the German Federal Bureau of Criminal Investigation "
"(FBCI) has \n"
"successfully mounted an \n"
"<a href=\"%(url)s\">attack</a> \n"
"on the network. Even though the method of this attack was later found to be illegal \n"
"in the German courts, the fact that the data was successfully collected is the \n"
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
"on the network. Even though the method of this attack was later found to"
" be illegal \n"
"in the German courts, the fact that the data was successfully collected "
"is the \n"
"concern. Courts change their minds based upon circumstance, and this is "
"evidence that \n"
"if a government body or intelligence agency wanted to, they could gather "
"the data, even \n"
"if it may be found inadmissible in some courts later)"
msgstr "JAP (Java Anonymous Proxy) est un réseau de mélange en cascades pour lanonymisation de demandes Web et comme tel a quelques nœuds centralisés (participants à la cascade) qui brassent et mélangent les requêtes des clients à travers la séquence de nœuds (la cascade) avant de les relayer vers le Web par un mandataire. Le champ dapplication, le modèle de menace et la sécurité sont sensiblement\ndifférents dI2P, mais pour ceux qui nexige pas un anonymat important, mais qui ne sont quand même pas satisfaits par un service genre Anonymizer, JAP mérite dêtre examiné. Une précaution à noter pour toute personne relevant de la juridiction des tribunaux allemands, car le bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la méthode de cette attaque a ensuite été jugée illégale par les tribunaux allemands, le fait que les données ont été recueillies avec succès est une préoccupation. Les tribunaux changent davis selon les circonstances et cest la preuve que si un organisme gouvernemental ou une agence de renseignement le voulaient, ils pourraient recueillir les données, même si cela peut être déclaré irrecevable ultérieurement par certains tribunaux)"
msgstr ""
"JAP (Java Anonymous Proxy) est un réseau de mélange en cascades pour "
"lanonymisation de demandes Web et comme tel a quelques nœuds centralisés"
" (participants à la cascade) qui brassent et mélangent les requêtes des "
"clients à travers la séquence de nœuds (la cascade) avant de les relayer "
"vers le Web par un mandataire. Le champ dapplication, le modèle de "
"menace et la sécurité sont sensiblement\n"
"différents dI2P, mais pour ceux qui nexige pas un anonymat important, "
"mais qui ne sont quand même pas satisfaits par un service genre "
"Anonymizer, JAP mérite dêtre examiné. Une précaution à noter pour toute "
"personne relevant de la juridiction des tribunaux allemands, car le "
"bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec "
"succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la"
" méthode de cette attaque a ensuite été jugée illégale par les tribunaux "
"allemands, le fait que les données ont été recueillies avec succès est "
"une préoccupation. Les tribunaux changent davis selon les circonstances "
"et cest la preuve que si un organisme gouvernemental ou une agence de "
"renseignement le voulaient, ils pourraient recueillir les données, même "
"si cela peut être déclaré irrecevable ultérieurement par certains "
"tribunaux)"
#: i2p2www/pages/site/comparison/other-networks.html:216
#, python-format
msgid ""
"Both of these systems work through the same basic \n"
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
"anonymity based on the threat model of providing plausible deniability against a simple \n"
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
"anonymity (though you don't have much control over who is in that group of peers)."
msgstr "Ces deux systèmes fonctionnent par le même routage <a href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré danonymat daprès un modèle de menace qui consiste à fournir un déni plausible contre un adversaire seul. Avec le routage dantnet, soit ils appliquent dabord un cheminement aléatoire, soit une recherche par diffusion pour trouver un pair ayant les données ou lidentité désirée. Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce chemin trouvé. Cela fonctionne bien pour les applications qui veulent simplement savoir ce que les autres aux alentours ont à offrir. « Comment allez vous tous&nbsp;? » par opposition à « Salut Alice, comment vas-tu&nbsp;? ». Vous obtenez essentiellement une grappe locale de nœuds qui peuvent partager des fichiers et garder un certain niveau danonymat (quoique vous nayez pas beaucoup de contrôle sur qui est dans ce groupe de pairs)."
"anonymity based on the threat model of providing plausible deniability "
"against a simple \n"
"non-colluding adversary. With the antnet routing, they first either do a"
" random walk or a \n"
"broadcast search to find some peer with the data or identity desired, and"
" then use a feedback\n"
"algorithm to optimize that found path. This works well for applications "
"that merely want to know \n"
"what other people around them have to offer - \"How are y'all doing\" vs."
" \"Hey Alice, how are you\" - \n"
"you basically get a local cluster of nodes that can share files with and "
"maintain some degree of \n"
"anonymity (though you don't have much control over who is in that group "
"of peers)."
msgstr ""
"Ces deux systèmes fonctionnent par le même routage <a "
"href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré "
"danonymat daprès un modèle de menace qui consiste à fournir un déni "
"plausible contre un adversaire seul. Avec le routage dantnet, soit ils "
"appliquent dabord un cheminement aléatoire, soit une recherche par "
"diffusion pour trouver un pair ayant les données ou lidentité désirée. "
"Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce "
"chemin trouvé. Cela fonctionne bien pour les applications qui veulent "
"simplement savoir ce que les autres aux alentours ont à offrir. « Comment"
" allez vous tous&nbsp;? » par opposition à « Salut Alice, comment vas-"
"tu&nbsp;? ». Vous obtenez essentiellement une grappe locale de nœuds qui "
"peuvent partager des fichiers et garder un certain niveau danonymat "
"(quoique vous nayez pas beaucoup de contrôle sur qui est dans ce groupe "
"de pairs)."
#: i2p2www/pages/site/comparison/other-networks.html:228
msgid ""
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
"while these networks can work great at small scales, they are not suitable for large networks where\n"
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
"value in these systems, just that their applicability is limited to situations where their \n"
"However, the algorithm does not scale well at all - if the application "
"wants to speak with a \n"
"particular peer it ends up doing a broadcast search or random walk "
"(though if they are lucky enough\n"
"for that to succeed, the antnet routing should optimize that found "
"connection). This means that \n"
"while these networks can work great at small scales, they are not "
"suitable for large networks where\n"
"someone wants to get in touch with another specific peer. That does not "
"mean that there is no \n"
"value in these systems, just that their applicability is limited to "
"situations where their \n"
"particular issues can be addressed."
msgstr "Cependant, lalgorithme dadaptation en taille (scale) ne se fait pas du tout - si lapplication veut parler avec un\npair en particulier cela finit par faire une large recherche (broadcast) ou une promenade aléatoire (random walk) (quoique sils ont assez\nde chance pour que cela réussisse, le routage antnet devrait optimiser cette connexion trouvée). Cela signifie que\ntandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne sont pas appropriés pour de grands réseaux où\nquelquun veut se mettre en contact avec un autre pair spécifique. Cela ne signifie pas quil ny a pas\nde valeur dans ces systèmes, juste que leur applicabilité est limitée aux situations où leur\nproblèmes (issues) particuliers peuvent être adressés."
msgstr ""
"Cependant, lalgorithme dadaptation en taille (scale) ne se fait pas du "
"tout - si lapplication veut parler avec un\n"
"pair en particulier cela finit par faire une large recherche (broadcast) "
"ou une promenade aléatoire (random walk) (quoique sils ont assez\n"
"de chance pour que cela réussisse, le routage antnet devrait optimiser "
"cette connexion trouvée). Cela signifie que\n"
"tandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne"
" sont pas appropriés pour de grands réseaux où\n"
"quelquun veut se mettre en contact avec un autre pair spécifique. Cela "
"ne signifie pas quil ny a pas\n"
"de valeur dans ces systèmes, juste que leur applicabilité est limitée aux"
" situations où leur\n"
"problèmes (issues) particuliers peuvent être adressés."
#: i2p2www/pages/site/comparison/other-networks.html:239
#, python-format
msgid ""
"This was a closed-source network targeted at Iranian users.\n"
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
"circumvention tool</a>.\n"
"Suffice it to say that being closed source and publicly targeting a "
"specific country are not good ideas.\n"
"I2P is, of course, open source. However, that source, and our\n"
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
msgstr "Cétait un réseau closed-source visant les utilisateurs iraniens.\nTor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que lon doit chercher dans un outil de mise en échec</a>.\nSuffit-il de dire que être closed-source et cibler publiquement un pays spécifique ne sont pas de bonnes idées.\nI2P est, bien sûr, open-source. Cependant, ce code source, et notre\n<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup plus dexamen."
msgstr ""
"Cétait un réseau closed-source visant les utilisateurs iraniens.\n"
"Tor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que lon "
"doit chercher dans un outil de mise en échec</a>.\n"
"Suffit-il de dire que être closed-source et cibler publiquement un pays "
"spécifique ne sont pas de bonnes idées.\n"
"I2P est, bien sûr, open-source. Cependant, ce code source, et notre\n"
"<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup "
"plus dexamen."
#: i2p2www/pages/site/comparison/other-networks.html:248
msgid "Paid VPN Services"
@@ -230,7 +435,9 @@ msgstr "Services RPV payants"
msgid ""
"You may contribute an analysis by entering a\n"
"<a href=\"%(trac)s\">new ticket on Trac</a>."
msgstr "Vous pouvez contribuer par votre analyse en saisissant un\n<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
msgstr ""
"Vous pouvez contribuer par votre analyse en saisissant un\n"
"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>."
#: i2p2www/pages/site/comparison/other-networks.html:254
msgid "Others"
@@ -258,7 +465,18 @@ msgid ""
"network, as well as gather and report statistics, as \n"
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
msgstr "Tor et le routage en oignon sont tous deux des réseaux mandataires danonymisation, permettant aux gens de tunnelliser par leur réseau de mélange à latence faible. Les deux principales différences entre Tor, le routage en oignon et I2P sont, encore une fois, liées à des différences dans le modèle de menaces et la conception du mandataire sortant (bien que Tor prenne aussi en charge les services cachés). De plus, Tor\nutilise une approche basée sur un annuaire, fournissant un point centralisé de gestion de la « vue » densemble du réseau, recueille et rapporte aussi des statistiques, contrairement à la <a href=\"%(netdb)s\">base de données de réseau</a> distribuée dI2P et la <a href=\"%(peerselection)s\">sélection de pairs</a>."
msgstr ""
"Tor et le routage en oignon sont tous deux des réseaux mandataires "
"danonymisation, permettant aux gens de tunnelliser par leur réseau de "
"mélange à latence faible. Les deux principales différences entre Tor, le "
"routage en oignon et I2P sont, encore une fois, liées à des différences "
"dans le modèle de menaces et la conception du mandataire sortant (bien "
"que Tor prenne aussi en charge les services cachés). De plus, Tor\n"
"utilise une approche basée sur un annuaire, fournissant un point "
"centralisé de gestion de la « vue » densemble du réseau, recueille et "
"rapporte aussi des statistiques, contrairement à la <a "
"href=\"%(netdb)s\">base de données de réseau</a> distribuée dI2P et la "
"<a href=\"%(peerselection)s\">sélection de pairs</a>."
#: i2p2www/pages/site/comparison/tor.html:23
msgid ""
@@ -271,7 +489,16 @@ msgid ""
"outproxies are prone to abuse, along with all of the \n"
"other security issues we've come to know and love with \n"
"normal Internet traffic."
msgstr "La fonctionnalité proxy sortant de I2P/Tor présente quelques\nfaiblesses importantes contre certains attaquants, à savoir quune fois que la communication quitte le mixnet, les adversaires\npassifs globaux peuvent plus facilement monter une analyse du trafic. En\noutre, les proxys sortants ont accès au texte en clair des données transférées \ndans les deux sens, et les proxys sortants sont sujets à des abus,\nen plus de tous les autres soucis de sécurité que nous\navons appris à connaître et à aimer avec le trafic Internet normal."
msgstr ""
"La fonctionnalité proxy sortant de I2P/Tor présente quelques\n"
"faiblesses importantes contre certains attaquants, à savoir quune fois "
"que la communication quitte le mixnet, les adversaires\n"
"passifs globaux peuvent plus facilement monter une analyse du trafic. En\n"
"outre, les proxys sortants ont accès au texte en clair des données "
"transférées \n"
"dans les deux sens, et les proxys sortants sont sujets à des abus,\n"
"en plus de tous les autres soucis de sécurité que nous\n"
"avons appris à connaître et à aimer avec le trafic Internet normal."
#: i2p2www/pages/site/comparison/tor.html:35
msgid ""
@@ -281,7 +508,14 @@ msgid ""
"to build outproxy functionality on top of an anonymous\n"
"communication layer, they can). In fact, some I2P users\n"
"currently take advantage of Tor to outproxy."
msgstr "Cependant, la plupart des gens ne doivent pas sinquiéter de\nces situations, car elles ne correspondent pas à leur modèle de menace. Et cela dépasse aussi le champ daction fonctionnel (officiel) dI2P (si des personnes veulent construire une fonction de mandataire sortant par-dessus une couche de communication anonyme, elles le peuvent). En fait, certains utilisateurs dI2P utilisent actuellement Tor comme mandataire sortant."
msgstr ""
"Cependant, la plupart des gens ne doivent pas sinquiéter de\n"
"ces situations, car elles ne correspondent pas à leur modèle de menace. "
"Et cela dépasse aussi le champ daction fonctionnel (officiel) dI2P (si "
"des personnes veulent construire une fonction de mandataire sortant par-"
"dessus une couche de communication anonyme, elles le peuvent). En fait, "
"certains utilisateurs dI2P utilisent actuellement Tor comme mandataire "
"sortant."
#: i2p2www/pages/site/comparison/tor.html:49
msgid "Comparison of Tor and I2P Terminology"
@@ -291,7 +525,9 @@ msgstr "Comparaison de terminologie entre Tor et I2P"
msgid ""
"While Tor and I2P are similar in many ways, much of the terminology is "
"different."
msgstr "Alors que Tor et I2P sont similaires à bien des égards, une grande partie de la terminologie est différente."
msgstr ""
"Alors que Tor et I2P sont similaires à bien des égards, une grande partie"
" de la terminologie est différente."
#: i2p2www/pages/site/comparison/tor.html:55
msgid "Cell"
@@ -435,14 +671,21 @@ msgstr "Avantages de Tor sur I2P"
#: i2p2www/pages/site/comparison/tor.html:78
msgid ""
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
"Much bigger user base; much more visibility in the academic and hacker "
"communities; benefits from\n"
"formal studies of anonymity, resistance, and performance;\n"
"has a non-anonymous, visible, university-based leader"
msgstr "Plus grand nombre dutilisateurs ; beaucoup plus de visibilité dans les communautés universitaires et hackers ; bénéficie\ndétudes formelles danonymat, de résistance, et de performance ;\na un chef de file universitaire non-anonyme, visible"
msgstr ""
"Plus grand nombre dutilisateurs ; beaucoup plus de visibilité dans les "
"communautés universitaires et hackers ; bénéficie\n"
"détudes formelles danonymat, de résistance, et de performance ;\n"
"a un chef de file universitaire non-anonyme, visible"
#: i2p2www/pages/site/comparison/tor.html:84
msgid "Has already solved some scaling issues I2P has yet to address"
msgstr "A déjà résolu certains problèmes déchelle que I2P na pas eu encore à aborder"
msgstr ""
"A déjà résolu certains problèmes déchelle que I2P na pas eu encore à "
"aborder"
#: i2p2www/pages/site/comparison/tor.html:85
msgid "Has significant funding"
@@ -454,24 +697,34 @@ msgstr "A davantage de développeurs, dont plusieurs sont financés"
#: i2p2www/pages/site/comparison/tor.html:88
msgid ""
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
msgstr "Plus résistant au blocage au niveau dun État en raison de la couche transport TLS et des ponts\n(I2P a des propositions pour des \"routes restreintes pleines\" mais celles-ci ne sont pas encore mises en œuvre)"
"More resistant to state-level blocking due to TLS transport layer and "
"bridges\n"
"(I2P has proposals for \"full restricted routes\" but these are not yet "
"implemented)"
msgstr ""
"Plus résistant au blocage au niveau dun État en raison de la couche "
"transport TLS et des ponts\n"
"(I2P a des propositions pour des \"routes restreintes pleines\" mais "
"celles-ci ne sont pas encore mises en œuvre)"
#: i2p2www/pages/site/comparison/tor.html:93
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
msgstr "Assez grand pour avoir dû sadapter aux tentatives de blocage et de DOS"
#: i2p2www/pages/site/comparison/tor.html:94
msgid ""
"Designed and optimized for exit traffic, with a large number of exit nodes"
msgstr "Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds de sortie"
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
msgstr ""
"Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds "
"de sortie"
#: i2p2www/pages/site/comparison/tor.html:96
msgid ""
"Better documentation, has formal papers and specifications,\n"
"better website, many more translations"
msgstr "Une meilleure documentation, a des papiers et des spécifications formelles, \nmeilleur site web, beaucoup plus de traductions"
msgstr ""
"Une meilleure documentation, a des papiers et des spécifications "
"formelles, \n"
"meilleur site web, beaucoup plus de traductions"
#: i2p2www/pages/site/comparison/tor.html:101
msgid "More efficient with memory usage"
@@ -485,13 +738,17 @@ msgstr "Les nœuds client de Tor ont une très faible surcharge de la bande pass
msgid ""
"Centralized control reduces the complexity at each\n"
"node and can efficiently address Sybil attacks"
msgstr "Le contrôle centralisé réduit la complexité à chaque\nnœud et peut répondre efficacement à des attaques Sybil"
msgstr ""
"Le contrôle centralisé réduit la complexité à chaque\n"
"nœud et peut répondre efficacement à des attaques Sybil"
#: i2p2www/pages/site/comparison/tor.html:110
msgid ""
"A core of high capacity nodes provides higher\n"
"throughput and lower latency"
msgstr "Un coeur de nœuds à grande capacité a la possibilité de fournir un\nplus haut débit tout en gardant une faible latence"
msgstr ""
"Un coeur de nœuds à grande capacité a la possibilité de fournir un\n"
"plus haut débit tout en gardant une faible latence"
#: i2p2www/pages/site/comparison/tor.html:115
msgid "C, not Java (ewww)"
@@ -503,9 +760,11 @@ msgstr "Avantages dI2P sur Tor"
#: i2p2www/pages/site/comparison/tor.html:120
msgid ""
"Designed and optimized for hidden services, which are much faster than in "
"Tor"
msgstr "Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide que dans Tor"
"Designed and optimized for hidden services, which are much faster than in"
" Tor"
msgstr ""
"Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide"
" que dans Tor"
#: i2p2www/pages/site/comparison/tor.html:121
msgid "Fully distributed and self organizing"
@@ -515,17 +774,25 @@ msgstr "Entièrement distribué et auto-organisé"
msgid ""
"Peers are selected by continuously profiling and ranking performance,\n"
"rather than trusting claimed capacity"
msgstr "Les pairs sont choisis par profilage continu et par classement de leurs performances,\nplutôt que de se contenter de faire confiance à la capacité quils revendiquent"
msgstr ""
"Les pairs sont choisis par profilage continu et par classement de leurs "
"performances,\n"
"plutôt que de se contenter de faire confiance à la capacité quils "
"revendiquent"
#: i2p2www/pages/site/comparison/tor.html:129
msgid ""
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
"rather than hardcoded"
msgstr "Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne sont pas fiables, plutôt que figés dans le code"
msgstr ""
"Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne"
" sont pas fiables, plutôt que figés dans le code"
#: i2p2www/pages/site/comparison/tor.html:134
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
msgstr "Tellement petit quil na pas été bloqué ni subi beaucoup de DOS, ou pas du tout"
msgstr ""
"Tellement petit quil na pas été bloqué ni subi beaucoup de DOS, ou pas "
"du tout"
#: i2p2www/pages/site/comparison/tor.html:135
msgid "Peer-to-peer friendly"
@@ -539,13 +806,17 @@ msgstr "Commutation de paquets à la place de commutation de circuit"
msgid ""
"implicit transparent load balancing of messages \n"
"across multiple peers, rather than a single path"
msgstr "équilibrage de charge transparent et implicite des messages\nà travers plusieurs pairs, plutôt que par un seul chemin"
msgstr ""
"équilibrage de charge transparent et implicite des messages\n"
"à travers plusieurs pairs, plutôt que par un seul chemin"
#: i2p2www/pages/site/comparison/tor.html:145
msgid ""
"resilience vs. failures by running multiple \n"
"tunnels in parallel, plus rotating tunnels"
msgstr "résistance contre les défaillances, ceci par exécution de plusieurs\ntunnels en parallèle, ainsi que par rotation des tunnels"
msgstr ""
"résistance contre les défaillances, ceci par exécution de plusieurs\n"
"tunnels en parallèle, ainsi que par rotation des tunnels"
#: i2p2www/pages/site/comparison/tor.html:151
msgid ""
@@ -553,14 +824,21 @@ msgid ""
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
"used by all of the peers Alice is talking with, \n"
"rather than a circuit for each)"
msgstr "sadapte à léchelle des connexions de chaque client à O(1) au lieu\nde O(N) (Alice a par exemple 2 tunnels entrants qui sont\nutilisés par tous les pairs avec lesquels parle Alice,\nplutôt quun circuit pour chaque)"
msgstr ""
"sadapte à léchelle des connexions de chaque client à O(1) au lieu\n"
"de O(N) (Alice a par exemple 2 tunnels entrants qui sont\n"
"utilisés par tous les pairs avec lesquels parle Alice,\n"
"plutôt quun circuit pour chaque)"
#: i2p2www/pages/site/comparison/tor.html:161
msgid ""
"Unidirectional tunnels instead of bidirectional\n"
"circuits, doubling the number of nodes a peer has to\n"
"compromise to get the same information."
msgstr "Tunnels unidirectionnels au lieu de circuits\nbidirectionnel, doublant le nombre de nœuds quun\npair doit avoir à compromettre pour obtenir la même information."
msgstr ""
"Tunnels unidirectionnels au lieu de circuits\n"
"bidirectionnel, doublant le nombre de nœuds quun\n"
"pair doit avoir à compromettre pour obtenir la même information."
#: i2p2www/pages/site/comparison/tor.html:166
#, python-format
@@ -574,7 +852,11 @@ msgid ""
"tunnels are used for more than simply passing end \n"
"to end messages (e.g. netDb, tunnel management, \n"
"tunnel testing)"
msgstr "Protection contre la détection de lactivité du client, même si un assaillant participe au tunnel, puisque les tunnels ne sont pas juste utilisés pour passer simplement des messages de bout en bout (p. ex. BDréseau, gestion de tunnels, test de tunnels)"
msgstr ""
"Protection contre la détection de lactivité du client, même si un "
"assaillant participe au tunnel, puisque les tunnels ne sont pas juste "
"utilisés pour passer simplement des messages de bout en bout (p. ex. "
"BDréseau, gestion de tunnels, test de tunnels)"
#: i2p2www/pages/site/comparison/tor.html:180
msgid ""
@@ -582,13 +864,19 @@ msgid ""
"of samples that an attacker can use to mount an \n"
"active attack with, unlike circuits in Tor, which are\n"
"typically long lived."
msgstr "Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le nombre déchantillons quun assaillant peut utiliser pour lancer une\nattaque active, contrairement aux circuits dans Tor, qui ont généralement une durée de vie longue."
msgstr ""
"Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le "
"nombre déchantillons quun assaillant peut utiliser pour lancer une\n"
"attaque active, contrairement aux circuits dans Tor, qui ont généralement"
" une durée de vie longue."
#: i2p2www/pages/site/comparison/tor.html:188
msgid ""
"I2P APIs are designed specifically for anonymity and\n"
"security, while SOCKS is designed for functionality."
msgstr "Les API dI2P sont conçues précisément pour assurer anonymat et sécurité, tandis que SOCKS est conçu pour la fonctionnalité."
msgstr ""
"Les API dI2P sont conçues précisément pour assurer anonymat et sécurité,"
" tandis que SOCKS est conçu pour la fonctionnalité."
#: i2p2www/pages/site/comparison/tor.html:193
msgid "Essentially all peers participate in routing for others"
@@ -599,7 +887,11 @@ msgid ""
"The bandwidth overhead of being a full peer is low, \n"
"while in Tor, while client nodes don't require much\n"
"bandwidth, they don't fully participate in the mixnet."
msgstr "Être un pair à part entière ne présente quune faible surcharge de bande passante, alors que dans Tor, bien que les nœuds client nexigent que peu de bande passante, ils ne participent pas complètement au réseau de mélange."
msgstr ""
"Être un pair à part entière ne présente quune faible surcharge de bande "
"passante, alors que dans Tor, bien que les nœuds client nexigent que peu"
" de bande passante, ils ne participent pas complètement au réseau de "
"mélange."
#: i2p2www/pages/site/comparison/tor.html:201
msgid "Integrated automatic update mechanism"
@@ -619,20 +911,27 @@ msgstr "Autres avantages potentiels dI2P, mais pas encore mis en œuvre"
#: i2p2www/pages/site/comparison/tor.html:207
msgid "...and may never be implemented, so don't count on them!"
msgstr "... et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur eux !"
msgstr ""
"... et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas "
"sur eux !"
#: i2p2www/pages/site/comparison/tor.html:210
msgid ""
"Defense vs. message count analysis by garlic wrapping \n"
"multiple messages"
msgstr "Défense contre lanalyse du nombre de messages par enveloppement en ail\nde plusieurs messages"
msgstr ""
"Défense contre lanalyse du nombre de messages par enveloppement en ail\n"
"de plusieurs messages"
#: i2p2www/pages/site/comparison/tor.html:216
msgid ""
"Defense vs. long term intersection by adding delays \n"
"at various hops (where the delays are not discernible\n"
"by other hops)"
msgstr "Défense contre intersection long terme en ajoutant des retards\nà différents sauts (où les retards ne sont pas discernables\npar dautres sauts)"
msgstr ""
"Défense contre intersection long terme en ajoutant des retards\n"
"à différents sauts (où les retards ne sont pas discernables\n"
"par dautres sauts)"
#: i2p2www/pages/site/comparison/tor.html:223
msgid ""
@@ -640,4 +939,9 @@ msgid ""
"create a tunnel that will handle 500 messages / minute,\n"
"where the endpoint will inject dummy messages if there\n"
"are insufficient messages, etc)"
msgstr "Diverses stratégies de mélange au niveau du tunnel (par exemple\ncréer un tunnel qui va gérer 500 messages / minute,\ndans lequel le point final va injecter des messages factices si\nil y a une nombre de messages insuffisant, etc)"
msgstr ""
"Diverses stratégies de mélange au niveau du tunnel (par exemple\n"
"créer un tunnel qui va gérer 500 messages / minute,\n"
"dans lequel le point final va injecter des messages factices si\n"
"il y a une nombre de messages insuffisant, etc)"

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -1,7 +1,7 @@
# Translations template for I2P.
# French translations for I2P.
# Copyright (C) 2018 ORGANIZATION
# This file is distributed under the same license as the I2P project.
#
#
# Translators:
# AO French coordinator <ao@localizationlab.org>, 2017
# Boxoa590, 2013
@@ -11,18 +11,17 @@
# Towinet, 2013-2014,2016
msgid ""
msgstr ""
"Project-Id-Version: I2P\n"
"Project-Id-Version: I2P\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2018-06-24 13:48+0000\n"
"PO-Revision-Date: 2018-06-24 18:45+0000\n"
"Last-Translator: Towinet\n"
"Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 1.3\n"
"Language: fr\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#: i2p2www/pages/site/research/index.html:2
msgid "Academic Research"
@@ -43,11 +42,16 @@ msgstr ""
#: i2p2www/pages/site/research/index.html:10
msgid ""
"I2P is a very unique project that unfortunately has not received the wider\n"
"academic attention it deserves. To date, most research focus on anonymous and\n"
"onion-routing technology has been around Tor, and while those papers benefit us\n"
"as well, there is a great need for I2P-focused research. This plays a key role\n"
"in both maintaining the security and integrity of the network, as well as\n"
"I2P is a very unique project that unfortunately has not received the "
"wider\n"
"academic attention it deserves. To date, most research focus on anonymous"
" and\n"
"onion-routing technology has been around Tor, and while those papers "
"benefit us\n"
"as well, there is a great need for I2P-focused research. This plays a key"
" role\n"
"in both maintaining the security and integrity of the network, as well as"
"\n"
"opening doors for more impactful future development."
msgstr ""
@@ -55,27 +59,48 @@ msgstr ""
#, python-format
msgid ""
"\n"
"There is a large research community investigating a wide range of aspects of\n"
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
"There is a large research community investigating a wide range of aspects"
" of\n"
"anonymity. For a current and comprehensive list of relevant papers, see "
"the\n"
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
"little dedicated research interest into the theory behind I2P, and the choices\n"
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
"I2P benefits from much of the research into Tor and onion routing, but "
"there is\n"
"little dedicated research interest into the theory behind I2P, and the "
"choices\n"
"and tradeoffs that the network makes. This presents a unique opportunity "
"for\n"
"original research.\n"
msgstr "\nIl y a une large communauté de recherche examinant une vaste gamme des aspects de\nlanonymat. Pour une liste actuelle et compréhensive des papiers pertinents, voir la\n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P bénéficie dune grande partie de la recherche faite dans Tor et le routage en oignon, mais il y a\npeu dintérêt en recherche consacrée à la théorie derrière I2P, et les choix\net différences que le réseau fait. Cela présente une occasion unique pour \nde la recherche originale.\n"
msgstr ""
"\n"
"Il y a une large communauté de recherche examinant une vaste gamme des "
"aspects de\n"
"lanonymat. Pour une liste actuelle et compréhensive des papiers "
"pertinents, voir la\n"
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
"I2P bénéficie dune grande partie de la recherche faite dans Tor et le "
"routage en oignon, mais il y a\n"
"peu dintérêt en recherche consacrée à la théorie derrière I2P, et les "
"choix\n"
"et différences que le réseau fait. Cela présente une occasion unique pour"
" \n"
"de la recherche originale.\n"
#: i2p2www/pages/site/research/index.html:29
#, python-format
msgid ""
"A list of known published papers about I2P is available <a "
"href=\"%(papers)s\">here</a>."
msgstr "Une liste des articles publiés connus sur I2P est proposée <a href=\"%(papers)s\">ici</a>."
msgstr ""
"Une liste des articles publiés connus sur I2P est proposée <a "
"href=\"%(papers)s\">ici</a>."
#: i2p2www/pages/site/research/index.html:34
msgid ""
"\n"
"This page aims to outline the most needed fields of research, notes to\n"
"potential researchers, our general safety guidelines as well as an expanding\n"
"potential researchers, our general safety guidelines as well as an "
"expanding\n"
"list of open questions that you can begin on at any time.\n"
msgstr ""
@@ -89,12 +114,16 @@ msgstr ""
#: i2p2www/pages/site/research/index.html:44
msgid ""
"While all research on the I2P network is beneficial and appreciated, there are\n"
"While all research on the I2P network is beneficial and appreciated, "
"there are\n"
"certain areas which are more in need than others - most so in defensive\n"
"research. Most people enjoy coming up with fun ways to launch offensives\n"
"against anonymous software, and this is further reinforced by the incentives in\n"
"academic institutions. While we know it is often not the first choice for\n"
"researchers, We would certainly appreciate any and all work towards ways to\n"
"against anonymous software, and this is further reinforced by the "
"incentives in\n"
"academic institutions. While we know it is often not the first choice for"
"\n"
"researchers, We would certainly appreciate any and all work towards ways "
"to\n"
"fortify the network!"
msgstr ""
@@ -105,17 +134,27 @@ msgstr ""
#: i2p2www/pages/site/research/index.html:56
#, python-format
msgid ""
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
"sooner the better. I2P is under constant development and a significant amount\n"
"of roadmapping occurs, therefore your problem may have already been identified\n"
"and flagged for update or patch. In the unlikely event you are conducting\n"
"testing that overlaps with / would be of interest to another research project\n"
"already in motion, we are also able to make you aware of this (with their\n"
"permission, of course), and possibly open the door for collaboration. There is\n"
"If you've decided on a research topic that aims to hands-on investigate "
"the I2P\n"
"network or solve a problem of large proportions we ask you to "
"<b>please</b> \n"
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
"team, the\n"
"sooner the better. I2P is under constant development and a significant "
"amount\n"
"of roadmapping occurs, therefore your problem may have already been "
"identified\n"
"and flagged for update or patch. In the unlikely event you are conducting"
"\n"
"testing that overlaps with / would be of interest to another research "
"project\n"
"already in motion, we are also able to make you aware of this (with their"
"\n"
"permission, of course), and possibly open the door for collaboration. "
"There is\n"
"also a chance that the test itself may significantly harm the network or\n"
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
"regular users, and the team may have ideas or suggestions to mitigate "
"that risk\n"
"and increase the safety of your testing."
msgstr ""
@@ -131,11 +170,13 @@ msgstr ""
msgid ""
"<ol>\n"
" <li>\n"
" Consider the benefits and risks - is there any doubt that the research\n"
" Consider the benefits and risks - is there any doubt that the "
"research\n"
" provides more value than danger?\n"
" </li>\n"
" <li>\n"
" If the research can be done on a test network then that is the preferred\n"
" If the research can be done on a test network then that is the "
"preferred\n"
" method\n"
" </li>\n"
" <li>\n"
@@ -143,8 +184,10 @@ msgid ""
" collecting data about yourself\n"
" </li>\n"
" <li>\n"
" If you need 'bigger data', It is recommended to first see if you can use\n"
" data sets from previous experiments or other third party resources is\n"
" If you need 'bigger data', It is recommended to first see if you can "
"use\n"
" data sets from previous experiments or other third party resources is"
"\n"
" recommended\n"
" </li>\n"
" <li>\n"
@@ -152,8 +195,10 @@ msgid ""
" publication and collect as little as possible\n"
" </li>\n"
" <li>\n"
" After testing and before publish, review that all data which is to be\n"
" published publicly is <b><i>not</i></b> intended to be private by the\n"
" After testing and before publish, review that all data which is to be"
"\n"
" published publicly is <b><i>not</i></b> intended to be private by the"
"\n"
" originator\n"
" </li>\n"
"</ol>"
@@ -165,24 +210,32 @@ msgstr ""
#: i2p2www/pages/site/research/index.html:108
msgid ""
"I2P can be run as a separate test network by controlling the locations that a\n"
"I2P can be run as a separate test network by controlling the locations "
"that a\n"
"new router reseeds from so that it only finds other test routers.\n"
"\n"
"The standard mode of operation is to have one JVM per router instance; hence\n"
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
"The standard mode of operation is to have one JVM per router instance; "
"hence\n"
"running multiple copies of I2P on a single machine is inadvisable, both "
"due to\n"
"the potential resource drain and the certain port conflicts. To better\n"
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
"facilitate setting up small test networks, I2P has a multirouter mode "
"which\n"
"enables multiple distinct routers to be run in the same JVM.\n"
"\n"
"MultiRouter can be started from the i2p base directory by running the below\n"
"MultiRouter can be started from the i2p base directory by running the "
"below\n"
"command."
msgstr ""
#: i2p2www/pages/site/research/index.html:124
msgid ""
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
"all transports, allowing the router to be tested in isolation without network\n"
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
"Additionally, I2P can be started in a virtual network mode. This mode "
"disables\n"
"all transports, allowing the router to be tested in isolation without "
"network\n"
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
"the\n"
"router.config before starting."
msgstr ""
@@ -193,10 +246,13 @@ msgstr ""
#: i2p2www/pages/site/research/index.html:133
#, python-format
msgid ""
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
"As stated above in the researcher notes, please <a "
"href=\"%(contact)s\">contact\n"
" us</a> before you commence your testing. While we do not discourage\n"
"researchers from responsibly testing their ideas on the live network, if an\n"
"attack becomes apparent and we don't have any line of communication then we\n"
"researchers from responsibly testing their ideas on the live network, if "
"an\n"
"attack becomes apparent and we don't have any line of communication then "
"we\n"
"will end up taking countermeasures which could interfere with the test."
msgstr ""
@@ -206,23 +262,35 @@ msgstr "Configuration dune famille de routeurs"
#: i2p2www/pages/site/research/index.html:143
msgid ""
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
"researchers who run multiple routers with the means to publicly identify those\n"
"routers. In turn, this helps the I2P project understand that these routers are\n"
"not running an attack on the network. It also will prevent other routers from\n"
"including multiple routers of the family in a single tunnel, which could lead\n"
"to deanonymization. Routers that appear to be colluding but do not have a\n"
"declared family may be assumed to be an attack on the network, and may be\n"
"blocked. The best way to ensure the success of your research project is to work\n"
"As of release 0.9.25, I2P supports a router family configuration. This "
"provides\n"
"researchers who run multiple routers with the means to publicly identify "
"those\n"
"routers. In turn, this helps the I2P project understand that these "
"routers are\n"
"not running an attack on the network. It also will prevent other routers "
"from\n"
"including multiple routers of the family in a single tunnel, which could "
"lead\n"
"to deanonymization. Routers that appear to be colluding but do not have a"
"\n"
"declared family may be assumed to be an attack on the network, and may be"
"\n"
"blocked. The best way to ensure the success of your research project is "
"to work\n"
"with us directly."
msgstr ""
#: i2p2www/pages/site/research/index.html:155
msgid ""
"A router family shares a private key so that participation in the family cannot\n"
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
"to generate the private key for the first router in the family. Then, export\n"
"A router family shares a private key so that participation in the family "
"cannot\n"
"be spoofed. To configure a router family, click on the 'I2P Internals' "
"link in\n"
"the router console, and then on the 'Family' tab. Follow the instructions"
" there\n"
"to generate the private key for the first router in the family. Then, "
"export\n"
"the key from that router, and import it to other members of the family."
msgstr ""
@@ -281,7 +349,8 @@ msgstr "Janvier 2017"
#: i2p2www/pages/site/research/vrp.html:6
msgid ""
"\n"
"This process is subject to change. Please refer to this page for the current VRP."
"This process is subject to change. Please refer to this page for the "
"current VRP."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:10
@@ -293,8 +362,7 @@ msgid "Security Response Team"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:16
msgid ""
"Only the following members have access to the security point of contact:"
msgid "Only the following members have access to the security point of contact:"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:25
@@ -311,7 +379,8 @@ msgstr "Courriel"
#: i2p2www/pages/site/research/vrp.html:37
msgid ""
"Response Team designates a Response Manager who is in charge of the particular\n"
"Response Team designates a Response Manager who is in charge of the "
"particular\n"
"report based on availability and/or knowledge-set."
msgstr ""
@@ -324,7 +393,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:47
msgid ""
"Response Manager makes inquiries to satisfy any needed information and to\n"
"Response Manager makes inquiries to satisfy any needed information and to"
"\n"
"confirm if submission is indeed a vulnerability."
msgstr ""
@@ -344,13 +414,14 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:62
msgid ""
"Response Manager moves discussion to a new or existing ticket on public Trac"
" if necessary."
"Response Manager moves discussion to a new or existing ticket on public "
"Trac if necessary."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:70
msgid ""
"If over email, Response Manager opens a HackerOne issue for new submission."
"If over email, Response Manager opens a HackerOne issue for new "
"submission."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:74
@@ -362,8 +433,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:79
msgid ""
"Effects network as a whole, has potential to break entire network or is on a"
" scale of great catastrophe."
"Effects network as a whole, has potential to break entire network or is "
"on a scale of great catastrophe."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:83
@@ -381,18 +452,19 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:97
#, python-format
msgid ""
"HIGH severities must be notified on website and news feed within %(limit)s\n"
"HIGH severities must be notified on website and news feed within "
"%(limit)s\n"
"working days of classification."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:102
msgid ""
"The notification should list appropriate steps for users to take, if any."
msgid "The notification should list appropriate steps for users to take, if any."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:105
msgid ""
"The notification must not include any details that could suggest an exploitation\n"
"The notification must not include any details that could suggest an "
"exploitation\n"
"path."
msgstr ""
@@ -414,7 +486,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:126
msgid ""
"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work in."
"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work "
"in."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:129
@@ -423,8 +496,10 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:132
msgid ""
"Any messages associated with PUBLIC commits during the time of review should not\n"
"make reference to the security nature of the PRIVATE branch or its commits."
"Any messages associated with PUBLIC commits during the time of review "
"should not\n"
"make reference to the security nature of the PRIVATE branch or its "
"commits."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:136
@@ -459,7 +534,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:163
msgid ""
"Response Manager includes vulnerability announcement draft in release notes."
"Response Manager includes vulnerability announcement draft in release "
"notes."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:166
@@ -472,13 +548,11 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:176
#, python-format
msgid ""
"Response Team has %(limit)s days to fulfill all points within section III."
msgid "Response Team has %(limit)s days to fulfill all points within section III."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:180
msgid ""
"If the Incident Response process in section III is successfully completed:"
msgid "If the Incident Response process in section III is successfully completed:"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:184
@@ -530,8 +604,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:215
msgid ""
"Workarounds (configuration changes users can make to reduce their exposure "
"to the vulnerability)."
"Workarounds (configuration changes users can make to reduce their "
"exposure to the vulnerability)."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:218
@@ -539,14 +613,13 @@ msgid "If applicable, credits to the original reporter."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:223
msgid ""
"Release finalized vulnerability announcement on website and in news feed."
msgid "Release finalized vulnerability announcement on website and in news feed."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:226
msgid ""
"For HIGH severities, release finalized vulnerability announcement on well-"
"known mailing lists:"
"For HIGH severities, release finalized vulnerability announcement on "
"well-known mailing lists:"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:234
@@ -555,8 +628,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:238
msgid ""
"The commit that applied the fix is made reference too in a future commit and"
" includes a CVE-ID."
"The commit that applied the fix is made reference too in a future commit "
"and includes a CVE-ID."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:246
@@ -567,28 +640,33 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:250
msgid ""
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
"in section III were not resolved and how the team can resolve them in the\n"
"Response Team and developers organize an IRC meeting to discuss why/what "
"points\n"
"in section III were not resolved and how the team can resolve them in the"
"\n"
"future."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:255
msgid ""
"Any developer meetings immediately following the incident should include points\n"
"Any developer meetings immediately following the incident should include "
"points\n"
"made in section V."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:259
msgid ""
"If disputes arise about whether or when to disclose information about a\n"
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
"vulnerability, the Response Team will publicly discuss the issue via IRC "
"and\n"
"attempt to reach consensus."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:264
#, python-format
msgid ""
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
"If consensus on a timely disclosure is not met (no later than %(limit)s "
"days),\n"
"the researcher (after %(limit)s days) has every right to expose the\n"
"vulnerability to the public."
msgstr ""
@@ -603,8 +681,7 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:278
#: i2p2www/pages/site/research/vrp.html:298
msgid ""
"Response Team and developers should coordinate to work on the following:"
msgid "Response Team and developers should coordinate to work on the following:"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:282
@@ -633,13 +710,15 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:308
msgid ""
"If results are not sensitive, share with the public via IRC or public Trac."
"If results are not sensitive, share with the public via IRC or public "
"Trac."
msgstr ""
#: i2p2www/pages/site/research/vrp.html:316
#, python-format
msgid ""
"Response Team has %(limit)s days following completion of section III to ensure\n"
"Response Team has %(limit)s days following completion of section III to "
"ensure\n"
"completion of section V."
msgstr ""
@@ -649,8 +728,10 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:324
msgid ""
"Any further questions or resolutions regarding the incident(s) between the\n"
"researcher and response + development team after public disclosure can be\n"
"Any further questions or resolutions regarding the incident(s) between "
"the\n"
"researcher and response + development team after public disclosure can be"
"\n"
"addressed via the following:"
msgstr ""
@@ -660,7 +741,8 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:341
msgid ""
"Response Team and developers should hold annual meetings to review the previous\n"
"Response Team and developers should hold annual meetings to review the "
"previous\n"
"year's incidents."
msgstr ""
@@ -697,3 +779,4 @@ msgstr ""
#: i2p2www/pages/site/research/vrp.html:372
msgid "Potential changes to this process to improve future responses."
msgstr ""