forked from I2P_Developers/i2p.www
Updated translations
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
# Translations template for I2P.
|
||||
# Chinese translations for I2P.
|
||||
# Copyright (C) 2018 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# nobody <oiiu19@yahoo.com>, 2015
|
||||
# nobody <oiiu19@yahoo.com>, 2016
|
||||
@@ -10,18 +10,18 @@
|
||||
# yue gao <gaoyue@iie.ac.cn>, 2017
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-08-24 11:51+0000\n"
|
||||
"Last-Translator: zzzi2p\n"
|
||||
"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"Language-Team: Chinese (China) "
|
||||
"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: zh_CN\n"
|
||||
"Plural-Forms: nplurals=1; plural=0;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@@ -29,37 +29,57 @@ msgstr "I2P 相比 Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr "Freenet是一个完全分布式的P2P匿名发布网络,提供安全的数据存储方式,以及一些试图解决洪泛负载的方法。虽然Freenet的设计目的是分布式的数据存储,但是人们也在Freenet之上建立了一些应用程序,使得更通用的匿名通信成为可能,如静态网站和留言板等。"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr "相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
|
||||
msgstr ""
|
||||
"相比于I2P,Freenet提供了一些实质性的好处——它是一个分布式的数据存储网络,而I2P并不是,Freenet允许用户检索已发布的内容,即便内容的发布者已经离线了。此外,Freenet应该能够高效地分发流行数据。I2P本身不提供此功能。另一方面,对于那些只想通过网站、留言板、文件共享程序等方式匿名交流的用户来说,这是有重叠的。I2P也进行了一些尝试以支持分布式数据存储,(最近的是<a"
|
||||
" href=\"%(tahoe)s\">Tahoe-LAFS</a>的移植) 但还没有准备好全面使用。"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@@ -69,11 +89,15 @@ msgstr "I2P与其他项目的比较"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@@ -88,8 +112,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@@ -114,31 +140,45 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@@ -146,15 +186,19 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@@ -166,20 +210,32 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@@ -188,23 +244,36 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@@ -212,8 +281,10 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@@ -433,10 +504,13 @@ msgstr "Tor 相对 I2P 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr "大许多的用户群;在学术和黑客群体中得到较多关注;\n基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
|
||||
msgstr ""
|
||||
"大许多的用户群;在学术和黑客群体中得到较多关注;\n"
|
||||
"基于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@@ -452,17 +526,20 @@ msgstr "有更多的开发者,其中有些是全职的"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n(I2P 有“完全限制路由”的提案,但还没有实现)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"由于具有基于 TLS 的传输和网桥,对国家级封锁有更强的抵抗\n"
|
||||
"(I2P 有“完全限制路由”的提案,但还没有实现)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "足够大所以它已经适应了封锁和拒绝服务攻击"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@@ -501,8 +578,8 @@ msgstr "I2P 相对 Tor 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr "专为隐藏服务设计和优化,在这方面比 Tor 快许多"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@@ -519,7 +596,9 @@ msgstr "通过不断分析和比较性能,而不是根据目录声称的流量
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr "种子节点(“目录服务器”)是持续变化并且不被信任的,\n而不是硬编码写入"
|
||||
msgstr ""
|
||||
"种子节点(“目录服务器”)是持续变化并且不被信任的,\n"
|
||||
"而不是硬编码写入"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@@ -639,3 +718,4 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
Reference in New Issue
Block a user