# Spanish translations for I2P. # Copyright (C) 2013 ORGANIZATION # This file is distributed under the same license as the I2P project. # # Translators: # Adolfo Jayme Barrientos , 2013 # Daniel Mustieles , 2013 # m1xxy , 2011 # olivertrash , 2013 # strel, 2013 # trolly, 2013 # trolly , 2013 msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" "POT-Creation-Date: 2013-10-26 22:39+0000\n" "PO-Revision-Date: 2013-09-20 10:34+0000\n" "Last-Translator: trolly \n" "Language-Team: Spanish " "(http://www.transifex.com/projects/p/I2P/language/es/)\n" "Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 2.0\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" msgstr "Comparación de I2P con Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" "Freenet is a fully distributed, peer to peer anonymous publishing " "network, offering \n" "secure ways to store data, as well as some approaches attempting to " "address the loads\n" "of a flash flood. While Freenet is designed as a distributed data store," " people have\n" "built applications on top of it to do more generic anonymous " "communication, such as \n" "static websites and message boards." msgstr "" "Freenet es una red completamente distribuida, red anónima de publicación " "par a par, que ofrece una forma segura de almacenar datos, y también " "enfocada en solucionar los problemas de carga y desbordamientos. Mientras" " que Freenet está diseñada como un almacén distribuido de datos, la gente" " ha construido aplicaciones sobre el sistema para tener otras " "comunicaciones anónimas genéricas, como webs estáticas y foros." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" "Compared to I2P, Freenet offers some substantial benefits - it is a " "distributed data\n" "store, while I2P is not, allowing people to retrieve the content " "published by others \n" "even when the publisher is no longer online. In addition, it should be " "able to \n" "distribute popular data fairly efficiently. I2P itself does not and will" " not provide \n" "this functionality. On the other hand, there is overlap for users who " "simply want to \n" "communicate with each other anonymously through websites, message boards," " file sharing\n" "programs, etc. There have also been some attempts to develop a " "distributed data \n" "store to run on top of I2P,\n" "(most recently a port of Tahoe-LAFS)\n" "but nothing is yet ready for general use." msgstr "" "Comparado con I2P, Freenet ofrece substanciales beneficios - es un " "sistema distribuido de almacenamiento de datos, mientras que I2P no lo " "es, permitiendo a la gente obtener al contenido publicado por otros " "incluso cuando el que lo ha publicado no esté online. Además es capaz de " "distribuir eficientemente la información más utilizada. I2P no tiene ni " "tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para " "los usuarios que simplemente quieren comunicarse con otros anónimamente a" " través de webs, foros, aplicaciones de compartición de archivos, etc. " "Ha habido varios intentos de desarrollar un sistema de almacenamiento " "distribuido funcionando sobre I2P, (más recientemente un port de Tahoe-LAFS) pero todavía no está listo para uso " "general." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" "However, even ignoring any implementations issues, there are some " "concerns \n" "about Freenet's algorithms from both a scalability and anonymity " "perspective, owing \n" "largely to Freenet's heuristic driven routing. The interactions of " "various techniques \n" "certainly may successfully deter various attacks, and perhaps some " "aspects of the \n" "routing algorithms will provide the hoped for scalability. " "Unfortunately, not much\n" "analysis of the algorithms involved has resulted in positive results, but" " there is still\n" "hope. At the very least, Freenet does provide substantial anonymity " "against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" "Sin embargo, e incluso ignorando los problemas de implementación, hay " "algunas preocupaciones sobre la escalabilidad y el anonimato de algunos " "algoritmos de Freenet, debido básicamente a la heurística de ruteo de " "Freenet. La unión de varias técnicas puede desalentar el hacer varios " "tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo " "podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos " "de los análisis sobre los algoritmos han dado resultados satisfactorios, " "pero aún hay esperanzas. Al final, Freenet nos proporciona bastante " "anonimato contra cualquier atacante que no tenga los recursos necesarios " "para análisis completos." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" msgstr "Comparando I2P con otros proyectos" #: i2p2www/pages/site/comparison/index.html:4 msgid "" "There are a great many other applications and projects working on " "anonymous \n" "communication and I2P has been inspired by much of their efforts. This " "is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" "Anonymity " "Bibliography\n" "and GNUnet's related " "projects\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" "Hay muchas otras buenas aplicaciones y proyectos trabajando en " "comunicaciones anónimas, e I2P se ha inspirado en muchos de sus " "esfuerzos. Esto no es una lista completa de recursos para el anonimato - " "ambos \n" "Anonymity " "Bibliography y los proyectos relacionados con " "GNUnet sirven también para ese mismo propósito. Dicho eso, pocos " "proyectos destacan como para comparaciones adicionales. Los siguientes " "proyectos tienen webs con comparaciones individuales:" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the other " "networks page:" msgstr "" "Los siguientes proyectos son discutidos en la página sobre otras redes:" #: i2p2www/pages/site/comparison/index.html:32 #, fuzzy, python-format msgid "" "The content of this page is subject to update, discussion and dispute, " "and we welcome comments and additions.\n" "You may contribute an analysis by entering a new " "ticket on Trac." msgstr "" "El contenido de esta página puede ser objeto de actualizaciones, " "discusión y disputa, y aprobamos comentarios y adiciones. Puede " "contribuir al análisis creando una nueva entrada en el Trac." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" msgstr "Comparación de I2P con otras redes anónimas" #: i2p2www/pages/site/comparison/other-networks.html:5 msgid "The following networks are discussed on this page." msgstr "Las siguientes redes son discutidas en esta página." #: i2p2www/pages/site/comparison/other-networks.html:16 #, fuzzy, python-format msgid "" "Most of the following sections are fairly old, and may not be accurate.\n" "For an overview of available comparisons, see the\n" "main network comparisons page.\n" "You may contribute an analysis by entering a\n" "new ticket on Trac." msgstr "" "La mayoría de las siguientes secciones son bastante viejas y podrían no " "ser precisas. Para una vista general de comparaciones disponibles, vea " "la página principal de comparaciones entre " "redes. Pude contribuir al análisis creando un nuevo ticket en el %(trac)s." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "Morphmix and Tarzan are both fully distributed, peer to peer networks of" " \n" "anonymizing proxies, allowing people to tunnel out through the low " "latency \n" "mix network. Morphmix includes some very interesting collusion detection" " \n" "algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " "IP\n" "addresses to accomplish the same. The two primary differences between \n" "these systems and I2P are related to I2P's threat model \n" "and their out-proxy design (as opposed to providing both sender and " "receiver \n" "anonymity). There is source code available to both systems, but we are " "not aware \n" "of their use outside of academic environments." msgstr "" "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par " "anónimas con proxies para el anonimato, permitiendo a la gente enviar " "datos fuera a través de redes de mezcla de baja latencia. Morphmix " "incluye unos algoritmos de detección de colisiones bastante interesante y" " defensas contra Sybil, mientras que Tarzan hace uso de la escasez de " "direcciones IP para obtener lo mismo. Las dos principales diferencias " "entre estos dos sistemas e I2P tienen que ver con el modelo de amenazas de I2P y su diseño de " "outproxies (al contrario que el anonimato proporcionado para ambos, el " "que envía y el que recibe). El código está disponible para ambos " "sistemas, pero no sabemos de su uso fuera de ambientes académicos." #: i2p2www/pages/site/comparison/other-networks.html:153 #, fuzzy, python-format msgid "" "\n" "Mixminion and Mixmaster are networks to support anonymous email against a" " very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example Syndie or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" "model of those adversaries, while running in parallel along side the " "needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" "High-latency support within the I2P router itself may or may not be added" " in a distant future release.\n" "It is too early to say if I2P will meet the needs of users requiring " "extreme protection for email." msgstr "" "\n" "Mixminion y Mixmaster son redes para el envío anónimo de emails. " "Aplicaciones de envío de mensajes de baja latencia sobre I2P (por ejemplo" " Syndie o I2PBote) podrían ser " "adecuadas para ese modelo de amenazas, ya que corriendo en paralelo " "cubren las necesidades de la baja latencia y crean una gran capa de " "anonimato. Soporte para alta latencia en los ruters de I2P puede que se " "añada en un futuro distante, o puede que no. Es demasiado pronto para " "decir si I2P podrá cubrir las necesidades de los usuarios con necesidades" " de protección extrema para sus emails." #: i2p2www/pages/site/comparison/other-networks.html:165 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." msgstr "" "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también" " la aproximación basada en directorios." #: i2p2www/pages/site/comparison/other-networks.html:175 #, python-format msgid "" "JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " "web requests,\n" "and as such it has a few centralized nodes (participants in the cascade) " "that blend\n" "and mix requests from clients through the sequence of nodes (the cascade)" " before \n" "proxying out onto the web. The scope, threat model, and security is " "substantially \n" "different from I2P, but for those who don't require significant anonymity" " but still\n" "are not satisfied with an Anonymizer-like service, JAP is worth " "reviewing. One\n" "caution to note is that anyone under the jurisdiction of the German " "courts may want\n" "to take care, as the German Federal Bureau of Criminal Investigation " "(FBCI) has \n" "successfully mounted an \n" "attack \n" "on the network. Even though the method of this attack was later found to" " be illegal \n" "in the German courts, the fact that the data was successfully collected " "is the \n" "concern. Courts change their minds based upon circumstance, and this is " "evidence that \n" "if a government body or intelligence agency wanted to, they could gather " "the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el " "anonimato de las solicitudes web que tiene varios nodos centrales " "(participantes en la cascada) que combinan y mezclan las solicitudes de " "los clientes a través de una secuencia de nodos (la cascada) antes de " "enviarlos por un proxy a la web. El alcance, modelo de amenazas y la " "seguridad son bastantes diferentes a las de I2P, pero para aquellos que " "requieran bastante anonimato pero no están satisfechos con un servicio de" " tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un " "precaución que debe tener todo aquel que se encuentre bajo la " "jurisdicción de los juzgados alemanes, es que el German Federal Bureau " "of Criminal Investigation (FBCI) ha montado un ataque con éxito sobre esta red. Incluso aunque el " "ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad" " es que la información fue sustraída con éxito. Los jueces cambian sus " "mentes basados en las circunstancias, y esta es la evidencia de que si el" " gobierno quisiese la información podrían conseguirla, aunque fuese " "inadmisible más tarde en un juicio)" #: i2p2www/pages/site/comparison/other-networks.html:197 #, python-format msgid "" "Both of these systems work through the same basic \n" "antnet routing, providing some degree of\n" "anonymity based on the threat model of providing plausible deniability " "against a simple \n" "non-colluding adversary. With the antnet routing, they first either do a" " random walk or a \n" "broadcast search to find some peer with the data or identity desired, and" " then use a feedback\n" "algorithm to optimize that found path. This works well for applications " "that merely want to know \n" "what other people around them have to offer - \"How are y'all doing\" vs." " \"Hey Alice, how are you\" - \n" "you basically get a local cluster of nodes that can share files with and " "maintain some degree of \n" "anonymity (though you don't have much control over who is in that group " "of peers)." msgstr "" "Estos dos sistemas trabajan con el rutado básico antnet, proporcionando anonimato al proveer " "negación plausible contra un simple adversario sin colisión. Con el " "rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast" " para encontrar el par o la identidad deseada, y después usan esa " "algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones " "que sólo quieren saber que tienen que ofrecer la gente que está alrededor" " - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se " "obtiene un conjunto de nodos que pueden compartit archivos y mantener el " "anonimato (aunque no se tiene mucho control sobre quién es ese grupo de " "pares)." #: i2p2www/pages/site/comparison/other-networks.html:209 msgid "" "However, the algorithm does not scale well at all - if the application " "wants to speak with a \n" "particular peer it ends up doing a broadcast search or random walk " "(though if they are lucky enough\n" "for that to succeed, the antnet routing should optimize that found " "connection). This means that \n" "while these networks can work great at small scales, they are not " "suitable for large networks where\n" "someone wants to get in touch with another specific peer. That does not " "mean that there is no \n" "value in these systems, just that their applicability is limited to " "situations where their \n" "particular issues can be addressed." msgstr "" "Sin embargo, el algoritmo no escala bien del todo - si la aplicación " "quiere hablar con un par en particular termina haciendo una búsqueda " "broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). " "Esto significa que mientras esas redes trabajan bien a escalas pequeñas, " "no son apropiadas para redes grandes donde alguien quiere ponerse en " "contacto con un par en particular. Esto no quiere decir que este sistema " "no tenga ningún valor, sólo que su aplicación está limitada a situaciones" " donde sus problemas pueden evitarse." #: i2p2www/pages/site/comparison/other-networks.html:220 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" "Tor did a good writeup on what to look for in a " "circumvention tool.\n" "Suffice it to say that being closed source and publicly targeting a " "specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "technical documentation, need much more review." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:229 msgid "Paid VPN Services" msgstr "Servicios VPN de pago" #: i2p2www/pages/site/comparison/other-networks.html:230 #: i2p2www/pages/site/comparison/other-networks.html:236 #, fuzzy, python-format msgid "" "You may contribute an analysis by entering a\n" "new ticket on Trac." msgstr "" "Puede contribuir con análisis creando un nuevo ticket en %(trac)s." #: i2p2www/pages/site/comparison/other-networks.html:235 msgid "Others" msgstr "Otros" #: i2p2www/pages/site/comparison/tor.html:2 msgid "I2P Compared to Tor" msgstr "Comparación de I2P con Tor" #: i2p2www/pages/site/comparison/tor.html:8 #, python-format msgid "" "Tor and Onion Routing are both anonymizing proxy networks, \n" "allowing people to tunnel out through their low latency mix \n" "network. The two primary differences between Tor / \n" "Onion-Routing and I2P are again related to differences in \n" "the threat model and the out-proxy design (though Tor\n" "supports hidden services as well). In addition, Tor\n" "takes the directory-based approach - providing a \n" "centralized point to manage the overall 'view' of the \n" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed network \n" "database and peer selection." msgstr "" "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a" " la gente salir a través de su red ya mezclada de baja latencia. Las dos " "primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo " "relacionas con las diferencias en el modelo de amenazas y el diseño de " "los outproxies (a través de Tor soporta también servicios ocultos). " "Además, Tor usa un enfoque basado en directorios - creando un punto " "central para manejar la 'vista' general de las redes, y además se " "obtienen más estadísticas, al contrario que la base" " de datos de la red dsitribuida de I2P y la selección de pares." #: i2p2www/pages/site/comparison/tor.html:22 msgid "" "The I2P/Tor outproxy functionality does have a few \n" "substantial weaknesses against certain attackers - \n" "once the communication leaves the mixnet, global passive\n" "adversaries can more easily mount traffic analysis. In \n" "addition, the outproxies have access to the cleartext \n" "of the data transferred in both directions, and \n" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." msgstr "" "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de " "ataques - una vez que la comunicación deja la red Tor, adversarios " "pasivos pueden hacer más fácilmente ataques de análisis. Además los " "outproxies tienen acceso al texto en claro transferido en las dos " "direcciones, y los outproxies son propensos a abusos, y además tenemos " "que tener en cuenta otros ataques posibles dentro del Internet normal." #: i2p2www/pages/site/comparison/tor.html:34 msgid "" "However, many people don't need to worry about those \n" "situations, as they are outside their threat model. It\n" "is, also, outside I2P's (formal) functional scope (if people want\n" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." msgstr "" "Aún así, mucha gente no tiene por que preocuparse por estas situaciones, " "ya que no están dentro del modelo de amenazas. Y además esto está fuera " "del alcance (formal) de I2P (si la gente desea construir un outproxy " "sobre la capa de comunicación anónima, pueden hacerlo). De hecho, " "actualmente algunos usuarios utilizan el outproxy de Tor." #: i2p2www/pages/site/comparison/tor.html:48 msgid "Comparison of Tor and I2P Terminology" msgstr "Comparación de la terminología de I2P y Tor" #: i2p2www/pages/site/comparison/tor.html:49 msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." msgstr "" "Mientras que Tor e I2p tienen algunas similitudes, mucha de la " "terminología cambia." #: i2p2www/pages/site/comparison/tor.html:54 msgid "Cell" msgstr "Celda" #: i2p2www/pages/site/comparison/tor.html:54 msgid "Message" msgstr "Mensaje" #: i2p2www/pages/site/comparison/tor.html:55 msgid "Client" msgstr "Cliente" #: i2p2www/pages/site/comparison/tor.html:55 msgid "Router or Client" msgstr "Ruter o Cliente" #: i2p2www/pages/site/comparison/tor.html:56 msgid "Circuit" msgstr "Circuito" #: i2p2www/pages/site/comparison/tor.html:56 msgid "Tunnel" msgstr "Túnel" #: i2p2www/pages/site/comparison/tor.html:57 msgid "Directory" msgstr "Directorio" #: i2p2www/pages/site/comparison/tor.html:57 msgid "NetDb" msgstr "NetDb, base de datos de la red" #: i2p2www/pages/site/comparison/tor.html:58 msgid "Directory Server" msgstr "Servidor de directorios" #: i2p2www/pages/site/comparison/tor.html:58 msgid "Floodfill Router" msgstr "Ruter Floodfill o de relleno" #: i2p2www/pages/site/comparison/tor.html:59 msgid "Entry Guards" msgstr "Control de entradas" #: i2p2www/pages/site/comparison/tor.html:59 msgid "Fast Peers" msgstr "Pares rápidos" #: i2p2www/pages/site/comparison/tor.html:60 msgid "Entry Node" msgstr "Nodo de entrada" #: i2p2www/pages/site/comparison/tor.html:60 msgid "Inproxy" msgstr "Inproxy, proxy de entrada" #: i2p2www/pages/site/comparison/tor.html:61 msgid "Exit Node" msgstr "Nodo de salida" #: i2p2www/pages/site/comparison/tor.html:61 msgid "Outproxy" msgstr "Outproxy, o proxy de salida" #: i2p2www/pages/site/comparison/tor.html:62 msgid "Hidden Service" msgstr "Servicio oculto" #: i2p2www/pages/site/comparison/tor.html:62 msgid "Eepsite or Destination" msgstr "Eepsite o destinación" #: i2p2www/pages/site/comparison/tor.html:63 msgid "Hidden Service Descriptor" msgstr "Descriptor de servicio oculto" #: i2p2www/pages/site/comparison/tor.html:63 msgid "LeaseSet" msgstr "LeaseSet" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Introduction point" msgstr "Punto de introducción" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Inbound Gateway" msgstr "Puerta de salida de entrada" #: i2p2www/pages/site/comparison/tor.html:65 msgid "Node" msgstr "Nodo" #: i2p2www/pages/site/comparison/tor.html:65 #: i2p2www/pages/site/comparison/tor.html:67 #: i2p2www/pages/site/comparison/tor.html:70 msgid "Router" msgstr "Ruter" #: i2p2www/pages/site/comparison/tor.html:66 msgid "Onion Proxy" msgstr "Proxy Onion" #: i2p2www/pages/site/comparison/tor.html:66 msgid "I2PTunnel Client (more or less)" msgstr "Cliente de I2PTunnel (más o menos)" #: i2p2www/pages/site/comparison/tor.html:67 msgid "Relay" msgstr "Relay" #: i2p2www/pages/site/comparison/tor.html:68 msgid "Rendezvous Point" msgstr "Punto de reunión" #: i2p2www/pages/site/comparison/tor.html:68 msgid "somewhat like Inbound Gateway + Outbound Endpoint" msgstr "" "algo así como inbound Gateway + Outbound Endpoint, puerta de salida de " "entrada + punto final de salida" #: i2p2www/pages/site/comparison/tor.html:69 msgid "Router Descriptor" msgstr "Descriptor del ruter" #: i2p2www/pages/site/comparison/tor.html:69 msgid "RouterInfo" msgstr "Información del ruter" #: i2p2www/pages/site/comparison/tor.html:70 msgid "Server" msgstr "Servidor" #: i2p2www/pages/site/comparison/tor.html:73 msgid "Benefits of Tor over I2P" msgstr "Beneficios de Tor sobre I2p" #: i2p2www/pages/site/comparison/tor.html:76 msgid "" "Much bigger user base; much more visibility in the academic and hacker " "communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" "El número de usuarios es mucho mayor; mucho más visible en entorno " "académicos y comunidades de hackers; tiene los beneficios de tener " "estudios formales sobre el anonimato, resistencia y rendimiento; y tienen" " un líder no anónimo universitario y visible" #: i2p2www/pages/site/comparison/tor.html:82 msgid "Has already solved some scaling issues I2P has yet to address" msgstr "Ha resuelto ya algunos problemas de escalado que I2P aún debe arreglar. " #: i2p2www/pages/site/comparison/tor.html:83 msgid "Has significant funding" msgstr "Tiene muchos fondos" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has more developers, including several that are funded" msgstr "Tiene más desarrolladores, incluso algunos con fondos" #: i2p2www/pages/site/comparison/tor.html:86 msgid "" "More resistant to state-level blocking due to TLS transport layer and " "bridges\n" "(I2P has proposals for \"full restricted routes\" but these are not yet " "implemented)" msgstr "" "Tiene un bloqueo de nivel de estado más resistente debido la capa de " "transporte TLS y a los puentes (I2P tienen propuestas de \"rutas " "completamente restringidas\" pero estas aún no están implementadas)" #: i2p2www/pages/site/comparison/tor.html:91 msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS" #: i2p2www/pages/site/comparison/tor.html:92 msgid "Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" "Diseñado para optimizar el tráfico de salida, con un gran número de nodos" " de salida" #: i2p2www/pages/site/comparison/tor.html:94 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" msgstr "" "Mejor documentación, tiene estudios formales y especificaciones, una web " "mejor, y muchas traducciones" #: i2p2www/pages/site/comparison/tor.html:99 msgid "More efficient with memory usage" msgstr "Más eficiente con el uso de la memoria" #: i2p2www/pages/site/comparison/tor.html:100 msgid "Tor client nodes have very low bandwidth overhead" msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada" #: i2p2www/pages/site/comparison/tor.html:102 msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" msgstr "" "El control centralizado reduce la complejidad de cada nodo y puede evitar" " ataques Sybil fácilmente" #: i2p2www/pages/site/comparison/tor.html:108 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" msgstr "" "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y " "menor latencia" #: i2p2www/pages/site/comparison/tor.html:113 msgid "C, not Java (ewww)" msgstr "C, no java (ey!)" #: i2p2www/pages/site/comparison/tor.html:116 msgid "Benefits of I2P over Tor" msgstr "Beneficios de I2P sobre Tor" #: i2p2www/pages/site/comparison/tor.html:118 msgid "" "Designed and optimized for hidden services, which are much faster than in" " Tor" msgstr "" "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos " "que los de Tor" #: i2p2www/pages/site/comparison/tor.html:119 msgid "Fully distributed and self organizing" msgstr "Totalmente distribuido y auto organizado" #: i2p2www/pages/site/comparison/tor.html:121 msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" msgstr "" "Los pares son seleccionados continuamente según el rendimiento y " "categoría, en vez de confiar en la capacidad indicada" #: i2p2www/pages/site/comparison/tor.html:127 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" msgstr "" "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de " "estar siempre fijos." #: i2p2www/pages/site/comparison/tor.html:132 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" msgstr "Tan pequeña que no ha sido bloqueada o Dosed." #: i2p2www/pages/site/comparison/tor.html:133 msgid "Peer-to-peer friendly" msgstr "Amigable con las aplicaciones p2p" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Packet switched instead of circuit switched" msgstr "Conmutado por paquete en vez de conmutado por circuito" #: i2p2www/pages/site/comparison/tor.html:137 msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" msgstr "" "Implica control de carga transparente de los mensajes a través de " "múltiples pares, en vez de por un sólo camino." #: i2p2www/pages/site/comparison/tor.html:143 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" msgstr "" "Resistencia contra fallos ya que usa varios túneles en paralelo, además " "de rotar los túneles" #: i2p2www/pages/site/comparison/tor.html:149 msgid "" "scale each client's connections at O(1) instead \n" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" msgstr "" "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por " "ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los " "pares con lo que habla Alice, en vez de un circuito por cada par)" #: i2p2www/pages/site/comparison/tor.html:159 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." msgstr "" "Túneles unidireccionales en vez de circuitos bidireccionales, usando el " "doble de nodos un par se compromete más para obtener la misma " "información." #: i2p2www/pages/site/comparison/tor.html:166 msgid "" "Protection against detecting client activity, even\n" "when an attacker is participating in the tunnel, as\n" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" msgstr "" "Protección contra la detección de la actividad de un cliente, incluso " "cuando un atacante participa en el túnel, ya que los túneles no son sólo " "usados para pasar el mensaje de punto a punto (por ejemplo, netDB, " "administración de túneles, pruebas en los túneles)" #: i2p2www/pages/site/comparison/tor.html:175 msgid "" "Tunnels in I2P are short lived, decreasing the number\n" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." msgstr "" "Los túneles de I2P tienen una vida corta, reduciendo el número de " "muestras que un atacante puede usar para lograr un ataque activo, al " "contrario que con los circuitos en Tor, que son típicamente de larga " "duración." #: i2p2www/pages/site/comparison/tor.html:183 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." msgstr "" "Los APIs de I2P están específicamente diseñados para el anonimato y la " "seguridad, mientras que SOCKS está diseñado para su funcionalidad." #: i2p2www/pages/site/comparison/tor.html:188 msgid "Essentially all peers participate in routing for others" msgstr "Básicamente todos los pares participan en el rutado de otros" #: i2p2www/pages/site/comparison/tor.html:190 msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." msgstr "" "El uso de ancho de banda de cualquier par completo es bajo, mientras que " "en Tor, aunque un nodo cliente no necesita mucho ancho de banda, " "realmente no participan completamente en la red." #: i2p2www/pages/site/comparison/tor.html:196 msgid "Integrated automatic update mechanism" msgstr "Sistema integrado de actualizaciones automáticas" #: i2p2www/pages/site/comparison/tor.html:197 msgid "Both TCP and UDP transports" msgstr "Ambos tipos de transporte, TCP y UDP" #: i2p2www/pages/site/comparison/tor.html:198 msgid "Java, not C (ewww)" msgstr "Java, en vez de C (ewww)" #: i2p2www/pages/site/comparison/tor.html:201 msgid "Other potential benefits of I2P but not yet implemented" msgstr "Otros beneficios potenciales de I2P aún no implementados" #: i2p2www/pages/site/comparison/tor.html:202 msgid "...and may never be implemented, so don't count on them!" msgstr "" "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente" " con ellos!" #: i2p2www/pages/site/comparison/tor.html:205 msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" msgstr "" "Defensa contra el análisis de conteo de mensajes envolviendo múltiples " "mensajes dentro de la red garlic" #: i2p2www/pages/site/comparison/tor.html:211 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" msgstr "" "Defensa contra la intersección a largo plazo añadiendo demoras en varios " "saltos (donde las demoras no son perceptibles por los otros saltos)" #: i2p2www/pages/site/comparison/tor.html:218 msgid "" "Various mixing strategies at the tunnel level (e.g.\n" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando " "túneles que manejarán 500 mensajes al minuto, donde el punto final " "inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"