Updated translations

This commit is contained in:
str4d
2018-09-12 12:18:57 +00:00
parent 0f0fd000e3
commit 30b922eb9f
161 changed files with 281876 additions and 134680 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -8,7 +8,7 @@ msgid ""
msgstr ""
"Project-Id-Version: I2P website\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2018-02-12 00:06+0000\n"
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
"PO-Revision-Date: 2014-02-09 19:53+0000\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: he <LL@li.org>\n"
@@ -102,7 +102,7 @@ msgid ""
"networks page:</a>"
msgstr ""
#: i2p2www/pages/site/comparison/index.html:32
#: i2p2www/pages/site/comparison/index.html:33
#, python-format
msgid ""
"The content of this page is subject to update, discussion and dispute, "
@@ -119,7 +119,7 @@ msgstr ""
msgid "The following networks are discussed on this page."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:16
#: i2p2www/pages/site/comparison/other-networks.html:17
#, python-format
msgid ""
"Most of the following sections are fairly old, and may not be accurate.\n"
@@ -132,6 +132,31 @@ msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:29
#, python-format
msgid ""
"RetroShare is a set of peer-to-peer applications running in a\n"
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
"such F2F \n"
"network makes direct IP connections only to authenticated peers "
"(\"friends\") after explicit \n"
"certificates exchange. It can discover unauthenticated peers (e.g. "
"friends of friends), \n"
"but connections to them are relayed over \"friend\" peers for providing "
"privacy and anonymity."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:37
msgid ""
"RetroShare is designed to build a private network of trusted peers, while"
" I2P is designed \n"
"to be a large-scaled public anonymous network. Recent versions of "
"RetroShare have options to run \n"
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
"connections are \n"
"anonymized and no trust is required for adding new \"friends\"."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:48
#, python-format
msgid ""
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
" \n"
"anonymizing proxies, allowing people to tunnel out through the low "
@@ -150,7 +175,7 @@ msgid ""
"of their use outside of academic environments."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:153
#: i2p2www/pages/site/comparison/other-networks.html:172
#, python-format
msgid ""
"\n"
@@ -169,13 +194,13 @@ msgid ""
"extreme protection for email."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:165
#: i2p2www/pages/site/comparison/other-networks.html:184
msgid ""
"As with Tor and Onion Routing, \n"
"both Mixminion and Mixmaster take the directory based approach as well."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:175
#: i2p2www/pages/site/comparison/other-networks.html:194
#, python-format
msgid ""
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
@@ -207,7 +232,7 @@ msgid ""
"if it may be found inadmissible in some courts later)"
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:197
#: i2p2www/pages/site/comparison/other-networks.html:216
#, python-format
msgid ""
"Both of these systems work through the same basic \n"
@@ -228,7 +253,7 @@ msgid ""
"of peers)."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:209
#: i2p2www/pages/site/comparison/other-networks.html:228
msgid ""
"However, the algorithm does not scale well at all - if the application "
"wants to speak with a \n"
@@ -245,7 +270,7 @@ msgid ""
"particular issues can be addressed."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:220
#: i2p2www/pages/site/comparison/other-networks.html:239
#, python-format
msgid ""
"This was a closed-source network targeted at Iranian users.\n"
@@ -257,19 +282,19 @@ msgid ""
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:229
#: i2p2www/pages/site/comparison/other-networks.html:248
msgid "Paid VPN Services"
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:230
#: i2p2www/pages/site/comparison/other-networks.html:236
#: i2p2www/pages/site/comparison/other-networks.html:249
#: i2p2www/pages/site/comparison/other-networks.html:255
#, python-format
msgid ""
"You may contribute an analysis by entering a\n"
"<a href=\"%(trac)s\">new ticket on Trac</a>."
msgstr ""
#: i2p2www/pages/site/comparison/other-networks.html:235
#: i2p2www/pages/site/comparison/other-networks.html:254
msgid "Others"
msgstr ""

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -8,7 +8,7 @@ msgid ""
msgstr ""
"Project-Id-Version: I2P website\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2018-02-12 00:06+0000\n"
"POT-Creation-Date: 2018-06-24 13:48+0000\n"
"PO-Revision-Date: 2014-02-09 19:53+0000\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: he <LL@li.org>\n"
@@ -23,29 +23,34 @@ msgid "Academic Research"
msgstr ""
#: i2p2www/pages/site/research/index.html:3
msgid "February 2016"
#: i2p2www/pages/site/research/questions.html:3
msgid "May 2018"
msgstr ""
#: i2p2www/pages/site/research/index.html:5
msgid ""
"Academic research and analysis of I2P is an important part of ensuring "
"that the software and network performs as expected and is safe for users "
"in hostile environments."
#: i2p2www/pages/site/research/index.html:6
msgid "Introduction"
msgstr ""
#: i2p2www/pages/site/research/index.html:9
#, python-format
#: i2p2www/pages/site/research/index.html:8
msgid "Research on the I2P Network"
msgstr ""
#: i2p2www/pages/site/research/index.html:10
msgid ""
"I2P is a very unique project that unfortunately has not received the "
"wider\n"
"academic attention it deserves. To date, most research focus on anonymous"
" and\n"
"onion-routing technology has been around Tor, and while those papers "
"benefit us\n"
"as well, there is a great need for I2P-focused research. This plays a key"
" role\n"
"in both maintaining the security and integrity of the network, as well as"
"\n"
"Recent events have prompted anonymity projects to provide specific "
"guidelines\n"
"for responsible research.\n"
"We endorse the <a href=\"%(torg)s\">Tor Ethical Research Guidelines</a> "
"and incorporate them here.\n"
"Please follow the Tor guidelines when researching I2P as well.\n"
"opening doors for more impactful future development."
msgstr ""
#: i2p2www/pages/site/research/index.html:16
#: i2p2www/pages/site/research/index.html:19
#, python-format
msgid ""
"\n"
@@ -63,136 +68,256 @@ msgid ""
"original research.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:26
#: i2p2www/pages/site/research/index.html:29
#, python-format
msgid ""
"A list of known published papers about I2P is available <a "
"href=\"%(papers)s\">here</a>."
msgstr ""
#: i2p2www/pages/site/research/index.html:30
#, python-format
#: i2p2www/pages/site/research/index.html:34
msgid ""
"\n"
"See also the <a href=\"%(torr)s\">Tor Research Home Page</a> for general "
"guidance and links.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:34
msgid "Testing Attacks on I2P"
msgstr ""
#: i2p2www/pages/site/research/index.html:36
msgid ""
"I2P can be run as a separate test network by controlling the locations "
"that a new router reseeds from so that it only finds other test routers."
"This page aims to outline the most needed fields of research, notes to\n"
"potential researchers, our general safety guidelines as well as an "
"expanding\n"
"list of open questions that you can begin on at any time.\n"
msgstr ""
#: i2p2www/pages/site/research/index.html:40
msgid ""
"The standard mode of operation is to have one JVM per router instance; "
"hence running multiple copies of I2P on a single machine is inadvisable, "
"both due to the potential resource drain and the certain port conflicts. "
"To better facilitate setting up small test networks, I2P has a "
"multirouter mode which enables multiple distinct routers to be run in the"
" same JVM."
msgid "Notes to Researchers:"
msgstr ""
#: i2p2www/pages/site/research/index.html:42
msgid "Defensive Research"
msgstr ""
#: i2p2www/pages/site/research/index.html:44
msgid ""
"MultiRouter can be started from the i2p base directory by running the "
"below command."
"While all research on the I2P network is beneficial and appreciated, "
"there are\n"
"certain areas which are more in need than others - most so in defensive\n"
"research. Most people enjoy coming up with fun ways to launch offensives\n"
"against anonymous software, and this is further reinforced by the "
"incentives in\n"
"academic institutions. While we know it is often not the first choice for"
"\n"
"researchers, We would certainly appreciate any and all work towards ways "
"to\n"
"fortify the network!"
msgstr ""
#: i2p2www/pages/site/research/index.html:49
msgid ""
"Additionally, I2P can be started in a virtual network mode. This mode "
"disables all transports, allowing the router to be tested in isolation "
"without network traffic. To enable this mode, add "
"<code>i2p.vmCommSystem=true</code> to the router.config before starting."
#: i2p2www/pages/site/research/index.html:54
msgid "Offensive and Analytic Tests"
msgstr ""
#: i2p2www/pages/site/research/index.html:53
msgid "Testing the Live I2P Network"
msgstr ""
#: i2p2www/pages/site/research/index.html:55
#: i2p2www/pages/site/research/index.html:56
#, python-format
msgid ""
"If you are planning on conducting research on the live I2P network, "
"please <a href=\"%(contact)s\">contact us</a> before you commence your "
"testing. While we do not discourage researchers from responsibly testing "
"their ideas on the live network, if an attack becomes apparent and we "
"don't have any line of communication then we will end up taking "
"countermeasures which could interfere with the test."
"If you've decided on a research topic that aims to hands-on investigate "
"the I2P\n"
"network or solve a problem of large proportions we ask you to "
"<b>please</b> \n"
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
"team, the\n"
"sooner the better. I2P is under constant development and a significant "
"amount\n"
"of roadmapping occurs, therefore your problem may have already been "
"identified\n"
"and flagged for update or patch. In the unlikely event you are conducting"
"\n"
"testing that overlaps with / would be of interest to another research "
"project\n"
"already in motion, we are also able to make you aware of this (with their"
"\n"
"permission, of course), and possibly open the door for collaboration. "
"There is\n"
"also a chance that the test itself may significantly harm the network or\n"
"regular users, and the team may have ideas or suggestions to mitigate "
"that risk\n"
"and increase the safety of your testing."
msgstr ""
#: i2p2www/pages/site/research/index.html:60
msgid "Router Family Configuration"
msgstr ""
#: i2p2www/pages/site/research/index.html:62
msgid ""
"As of release 0.9.25, I2P supports a router family configuration.\n"
"This provides researchers who run multiple routers with the means to "
"publicly identify those routers.\n"
"In turn, this helps the I2P project understand that these routers are not"
" running an attack on the network.\n"
"It also will prevent other routers from including multiple routers of the"
" family in a single tunnel,\n"
"which could lead to deanonymization.\n"
"Routers that appear to be colluding but do not have a declared family may"
" be assumed to\n"
"be an attack on the network, and may be blocked.\n"
"The best way to ensure the success of your research project is to work "
"with us."
#: i2p2www/pages/site/research/index.html:71
msgid "Research Ethics &amp; Testing the Network"
msgstr ""
#: i2p2www/pages/site/research/index.html:73
msgid "General Guidelines"
msgstr ""
#: i2p2www/pages/site/research/index.html:75
msgid ""
"<ol>\n"
" <li>\n"
" Consider the benefits and risks - is there any doubt that the "
"research\n"
" provides more value than danger?\n"
" </li>\n"
" <li>\n"
" If the research can be done on a test network then that is the "
"preferred\n"
" method\n"
" </li>\n"
" <li>\n"
" If you must operate on the live network, the safest route is only\n"
" collecting data about yourself\n"
" </li>\n"
" <li>\n"
" If you need 'bigger data', It is recommended to first see if you can "
"use\n"
" data sets from previous experiments or other third party resources is"
"\n"
" recommended\n"
" </li>\n"
" <li>\n"
" If you must collect data on the live network, ensure it is safe for\n"
" publication and collect as little as possible\n"
" </li>\n"
" <li>\n"
" After testing and before publish, review that all data which is to be"
"\n"
" published publicly is <b><i>not</i></b> intended to be private by the"
"\n"
" originator\n"
" </li>\n"
"</ol>"
msgstr ""
#: i2p2www/pages/site/research/index.html:106
msgid "Using a Test Network to Attack I2P"
msgstr ""
#: i2p2www/pages/site/research/index.html:108
msgid ""
"I2P can be run as a separate test network by controlling the locations "
"that a\n"
"new router reseeds from so that it only finds other test routers.\n"
"\n"
"The standard mode of operation is to have one JVM per router instance; "
"hence\n"
"running multiple copies of I2P on a single machine is inadvisable, both "
"due to\n"
"the potential resource drain and the certain port conflicts. To better\n"
"facilitate setting up small test networks, I2P has a multirouter mode "
"which\n"
"enables multiple distinct routers to be run in the same JVM.\n"
"\n"
"MultiRouter can be started from the i2p base directory by running the "
"below\n"
"command."
msgstr ""
#: i2p2www/pages/site/research/index.html:124
msgid ""
"Additionally, I2P can be started in a virtual network mode. This mode "
"disables\n"
"all transports, allowing the router to be tested in isolation without "
"network\n"
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
"the\n"
"router.config before starting."
msgstr ""
#: i2p2www/pages/site/research/index.html:131
msgid "Testing on the Live I2P Network"
msgstr ""
#: i2p2www/pages/site/research/index.html:133
#, python-format
msgid ""
"As stated above in the researcher notes, please <a "
"href=\"%(contact)s\">contact\n"
" us</a> before you commence your testing. While we do not discourage\n"
"researchers from responsibly testing their ideas on the live network, if "
"an\n"
"attack becomes apparent and we don't have any line of communication then "
"we\n"
"will end up taking countermeasures which could interfere with the test."
msgstr ""
#: i2p2www/pages/site/research/index.html:141
msgid "Router Family Configuration"
msgstr ""
#: i2p2www/pages/site/research/index.html:143
msgid ""
"As of release 0.9.25, I2P supports a router family configuration. This "
"provides\n"
"researchers who run multiple routers with the means to publicly identify "
"those\n"
"routers. In turn, this helps the I2P project understand that these "
"routers are\n"
"not running an attack on the network. It also will prevent other routers "
"from\n"
"including multiple routers of the family in a single tunnel, which could "
"lead\n"
"to deanonymization. Routers that appear to be colluding but do not have a"
"\n"
"declared family may be assumed to be an attack on the network, and may be"
"\n"
"blocked. The best way to ensure the success of your research project is "
"to work\n"
"with us directly."
msgstr ""
#: i2p2www/pages/site/research/index.html:155
msgid ""
"A router family shares a private key so that participation in the family "
"cannot be spoofed.\n"
"To configure a router family, click on the 'I2P Internals' link in the "
"router console,\n"
"and then on the 'Family' tab.\n"
"Follow the instructions there to generate the private key for the first "
"router in the family.\n"
"Then, export the key from that router, and import it to other members of "
"the family."
"cannot\n"
"be spoofed. To configure a router family, click on the 'I2P Internals' "
"link in\n"
"the router console, and then on the 'Family' tab. Follow the instructions"
" there\n"
"to generate the private key for the first router in the family. Then, "
"export\n"
"the key from that router, and import it to other members of the family."
msgstr ""
#: i2p2www/pages/site/research/questions.html:2
msgid "Open research questions"
msgstr ""
#: i2p2www/pages/site/research/questions.html:4
#: i2p2www/pages/site/research/questions.html:5
msgid "Network database"
msgstr ""
#: i2p2www/pages/site/research/questions.html:6
msgid "Floodfills"
msgstr ""
#: i2p2www/pages/site/research/questions.html:19
msgid "Transports"
msgstr ""
#: i2p2www/pages/site/research/questions.html:11
#: i2p2www/pages/site/research/questions.html:31
msgid "Tunnels and Destinations"
msgstr ""
#: i2p2www/pages/site/research/questions.html:13
#: i2p2www/pages/site/research/questions.html:33
msgid "Peer selection"
msgstr ""
#: i2p2www/pages/site/research/questions.html:15
#: i2p2www/pages/site/research/questions.html:46
msgid "Unidirectional tunnels"
msgstr ""
#: i2p2www/pages/site/research/questions.html:21
#: i2p2www/pages/site/research/questions.html:52
msgid "Multihoming"
msgstr ""
#: i2p2www/pages/site/research/questions.html:28
#: i2p2www/pages/site/research/questions.html:59
msgid "Message routing"
msgstr ""
#: i2p2www/pages/site/research/questions.html:66
msgid "Anonymity"
msgstr ""
#: i2p2www/pages/site/research/questions.html:75
msgid "Network Related"
msgstr ""
#: i2p2www/pages/site/research/vrp.html:2
msgid "Vulnerability Response Process"
msgstr ""
@@ -635,3 +760,6 @@ msgstr ""
msgid "Potential changes to this process to improve future responses."
msgstr ""